From: Austin Obyrne <austin.obyrne@hotmail.com>
Subject: Re: Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" - Free Down load.
Date: Thu, 28 Aug 2014 09:31:32 -0700 (PDT)
Date: 2014-08-28T09:31:32-07:00 [thread overview]
Message-ID: <70511b33-2784-4ef6-b3c5-2bc374881c7e@googlegroups.com> (raw)
In-Reply-To: <288ae016-9c9c-4537-b9f8-791d5b2c445b@googlegroups.com>
On Thursday, August 28, 2014 3:09:10 PM UTC+1, austin.o...@btinternet.com wrote:
> Further to my earlier recent post "In the Pipe Line" announcement this cipher is now ready for downloading.
>
>
>
> http://www.adacryptpages.com
>
>
>
> Please look for this title box - in the lower RH corner.
>
>
>
> "Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography for Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8. OS"
>
>
>
> The down load contains,
>
>
>
> 1) Program source code in Ada-95
>
> 2) Comprehensive User Guide
>
> 3) Ada gnat 311.p compiler for ready-to-use installing - user convenience.
>
>
>
> Note. - this cipher is downloadable by all and sundry with my best wishes.
>
>
>
> You may decide to use this cipher in many ways from just securing your information at home or in out-of-office situations.
>
>
>
> However,
>
>
>
> For NETWORKING - i.e. setting up secure loops (channels) with other entities.
>
>
>
> The copy you have down-loaded must be configured uniquely by you (in a few easy steps as described here). You then record and keep this program (associated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) to your client 'Bob'(you being the sending entity 'Alice' - industry standard pseudonyms).
>
>
>
> Configuring
>
> Please locate this piece of the sourcecode below in each of these main programs "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENCRYPTIONS_MARK_0" program.
>
>
>
> FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS
>
> NumOut: Integer;
>
>
>
> BEGIN --Compose_CipherText_Items;
>
>
>
> CASE NumIn IS
>
>
>
> WHEN 1 => NumOut:= Pn(1)+ Hash_2(Count); -- these
>
> WHEN 2 => NumOut:= Pn(2)+ Hash_11(Count);
>
> WHEN 3 => NumOut:= Pn(3)+ Hash_12(Count);
>
> WHEN OTHERS =>
>
> Ada.Text_IO. Put (Item => "Forget it ");
>
> END CASE;
>
> RETURN NumOut;
>
>
>
> END Compose_CipherText_Items;
>
>
>
> *The focus is on the key information 'Hash_n' above.
>
>
>
> Note :- there are 12 distinct Hash programs available within the software program arrays and taken 3 at a time this enables 12!(factorial)/3!(factorial) different permutations of settings => The Ada 'Case' Package may therefore have close on 80 million distinct Hash settings. - Choose one permutation as above and insert this into the programs NAMED in capitals above- this configures your software uniquely.
>
>
>
> Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" please find these lines and make the exact same changes as you did in the other programs.
>
>
>
> Pn(1):= W(1) - Hash_2(Count); -- change these also
>
> Pn(2):= W(2) - Hash_11(Count);
>
> Pn(3):= W(3) - Hash_12(Count);
>
>
>
> When all of this is done the two configured softwares will be identical and will comprise the "Mutual Databases" described in the User-Guide.
>
>
>
> You can do this as often as you wish and create as many secure loops with other people as you like (before I call time on the copyright (much later) - maybe !.)
>
>
>
> *Important - You should immediately test your configuration changes by test-running the prepared batch files of plaintext that are provided. => Encrypt and immediately Decrypt at least some of the test files as well as also simulating a trial 'Email' program.
>
>
>
> Note also, in addition to this (i.e. uniquely configuring mutual databases) you can still configure the installed 'Key Pad' in the open source code Ada-95 program as often as you think fit in interim daily encryption work sessions .
>
>
>
> As long as the entities keep their mutual databases safe from common criminal theft (ordinary good housekeeping) you can enjoy perfect secrecy of communications for evermore.
>
>
>
> The ciphertext string is a string of large (7 digits) integers and it travels from Alice to Bob as a pasted attachment to an unsecured email. Periodic parameter changes in the 'Ked Pad' may go unsecured also (but you may prefer them encrypted - so be it also).
>
>
>
> Enjoy,
>
>
>
> I can be contacted on this URL :- austin.obyrne@hotmail.com
>
>
>
> adacrypt.
>
>
>
> ----------------------------------------------------------
I have accidentally overstated the permutation space . It should read 12!/(12 -3)! or 1320 - this is still quite Ok.
adacrypt
next prev parent reply other threads:[~2014-08-28 16:31 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-08-28 14:09 Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" - Free Down load austin.obyrne769
2014-08-28 16:00 ` Austin Obyrne
2014-08-28 16:31 ` Austin Obyrne [this message]
2014-08-28 16:46 ` Denis McMahon
replies disabled
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox