comp.lang.ada
 help / color / mirror / Atom feed
From: Austin Obyrne <austin.obyrne@hotmail.com>
Subject: Re: Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" -  Free Down load.
Date: Thu, 28 Aug 2014 09:31:32 -0700 (PDT)
Date: 2014-08-28T09:31:32-07:00	[thread overview]
Message-ID: <70511b33-2784-4ef6-b3c5-2bc374881c7e@googlegroups.com> (raw)
In-Reply-To: <288ae016-9c9c-4537-b9f8-791d5b2c445b@googlegroups.com>

On Thursday, August 28, 2014 3:09:10 PM UTC+1, austin.o...@btinternet.com wrote:
> Further to my earlier recent post "In the Pipe Line" announcement this cipher is now ready for downloading.
> 
> 
> 
> http://www.adacryptpages.com 
> 
> 
> 
> Please look for this title box - in the lower RH corner.
> 
> 
> 
> "Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography for Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8. OS"
> 
> 
> 
> The down load contains,
> 
> 
> 
> 1) Program source code in Ada-95
> 
> 2) Comprehensive User Guide
> 
> 3) Ada gnat 311.p compiler for ready-to-use installing - user  convenience.
> 
> 
> 
> Note. - this cipher is downloadable by all and sundry with my best wishes.
> 
> 
> 
> You may decide to use this cipher in many ways from just securing your information at home or in out-of-office situations. 
> 
> 
> 
> However,
> 
> 
> 
> For NETWORKING - i.e. setting up secure loops (channels) with other entities.
> 
> 
> 
> The copy you have down-loaded must be configured uniquely by you (in a few easy steps as described here). You then record and keep this program (associated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) to your client 'Bob'(you being the sending entity 'Alice' - industry standard pseudonyms). 
> 
> 
> 
> Configuring
> 
> Please locate this piece of the sourcecode below in each of these main programs "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENCRYPTIONS_MARK_0" program. 
> 
> 
> 
> FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS
> 
>     NumOut: Integer;
> 
> 
> 
> BEGIN --Compose_CipherText_Items;
> 
> 
> 
> CASE NumIn IS
> 
>    
> 
>    WHEN 1 => NumOut:= Pn(1)+ Hash_2(Count); -- these
> 
>    WHEN 2 => NumOut:= Pn(2)+ Hash_11(Count);
> 
>    WHEN 3 => NumOut:= Pn(3)+ Hash_12(Count);
> 
>           WHEN OTHERS =>
> 
>     Ada.Text_IO. Put (Item => "Forget it ");
> 
>   END CASE;
> 
>   RETURN NumOut;
> 
> 
> 
> END Compose_CipherText_Items;
> 
> 
> 
> *The focus is on the key information 'Hash_n' above.
> 
> 
> 
> Note :- there are 12 distinct Hash programs available within the software program arrays and taken 3 at a time this enables 12!(factorial)/3!(factorial) different permutations of settings => The Ada 'Case' Package  may therefore have close on 80 million distinct Hash settings. - Choose one permutation as above and insert this into the programs NAMED in capitals above- this configures your software uniquely.
> 
> 
> 
> Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" please find these lines and make the exact same changes as you did in the other programs.
> 
> 
> 
>   Pn(1):= W(1) - Hash_2(Count);  -- change these also
> 
>   Pn(2):= W(2) - Hash_11(Count); 
> 
>   Pn(3):= W(3) - Hash_12(Count);
> 
> 
> 
> When all of this is done the two configured softwares will be identical and will comprise the "Mutual Databases" described in the User-Guide.
> 
>  
> 
> You can do this as often as you wish and create as many secure loops with other people as you like (before I call time on the copyright (much later) - maybe !.)
> 
> 
> 
> *Important - You should immediately test your configuration changes by test-running the prepared batch files of plaintext that are provided. => Encrypt and immediately Decrypt at least some of the test files as well as also simulating a trial 'Email' program.
> 
> 
> 
> Note also, in addition to this (i.e. uniquely configuring mutual databases) you can still configure the installed 'Key Pad' in the open source code Ada-95 program as often as you think fit in interim daily encryption work sessions .
> 
> 
> 
> As long as the entities keep their mutual databases safe from common criminal theft (ordinary good housekeeping) you can enjoy perfect secrecy of communications for evermore.
> 
> 
> 
> The ciphertext string is a string of large (7 digits) integers and it travels from Alice to Bob as a pasted attachment to an unsecured email.  Periodic parameter changes  in the 'Ked Pad' may go unsecured also (but you may prefer them encrypted - so be it also).
> 
> 
> 
> Enjoy,
> 
> 
> 
> I can be contacted on this URL :- austin.obyrne@hotmail.com
> 
> 
> 
> adacrypt.
> 
> 
> 
>           ----------------------------------------------------------

I have accidentally overstated the permutation space . It should read 12!/(12 -3)! or 1320 - this is still quite Ok.

adacrypt


  parent reply	other threads:[~2014-08-28 16:31 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-08-28 14:09 Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" - Free Down load austin.obyrne769
2014-08-28 16:00 ` Austin Obyrne
2014-08-28 16:31 ` Austin Obyrne [this message]
2014-08-28 16:46 ` Denis McMahon
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox