From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.66.97.38 with SMTP id dx6mr2414339pab.46.1409243492546; Thu, 28 Aug 2014 09:31:32 -0700 (PDT) X-Received: by 10.140.37.39 with SMTP id q36mr45324qgq.10.1409243492494; Thu, 28 Aug 2014 09:31:32 -0700 (PDT) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!feeder.erje.net!eu.feeder.erje.net!newspeer1.nac.net!border2.nntp.dca1.giganews.com!nntp.giganews.com!uq10no6358361igb.0!news-out.google.com!q8ni2qal.1!nntp.google.com!m5no3891582qaj.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Thu, 28 Aug 2014 09:31:32 -0700 (PDT) In-Reply-To: <288ae016-9c9c-4537-b9f8-791d5b2c445b@googlegroups.com> Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=5.81.69.184; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg NNTP-Posting-Host: 5.81.69.184 References: <288ae016-9c9c-4537-b9f8-791d5b2c445b@googlegroups.com> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <70511b33-2784-4ef6-b3c5-2bc374881c7e@googlegroups.com> Subject: Re: Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" - Free Down load. From: Austin Obyrne Injection-Date: Thu, 28 Aug 2014 16:31:32 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Xref: news.eternal-september.org comp.lang.ada:21953 Date: 2014-08-28T09:31:32-07:00 List-Id: On Thursday, August 28, 2014 3:09:10 PM UTC+1, austin.o...@btinternet.com w= rote: > Further to my earlier recent post "In the Pipe Line" announcement this ci= pher is now ready for downloading. >=20 >=20 >=20 > http://www.adacryptpages.com=20 >=20 >=20 >=20 > Please look for this title box - in the lower RH corner. >=20 >=20 >=20 > "Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography = for Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8= . OS" >=20 >=20 >=20 > The down load contains, >=20 >=20 >=20 > 1) Program source code in Ada-95 >=20 > 2) Comprehensive User Guide >=20 > 3) Ada gnat 311.p compiler for ready-to-use installing - user convenienc= e. >=20 >=20 >=20 > Note. - this cipher is downloadable by all and sundry with my best wishes= . >=20 >=20 >=20 > You may decide to use this cipher in many ways from just securing your in= formation at home or in out-of-office situations.=20 >=20 >=20 >=20 > However, >=20 >=20 >=20 > For NETWORKING - i.e. setting up secure loops (channels) with other entit= ies. >=20 >=20 >=20 > The copy you have down-loaded must be configured uniquely by you (in a fe= w easy steps as described here). You then record and keep this program (ass= ociated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) t= o your client 'Bob'(you being the sending entity 'Alice' - industry standar= d pseudonyms).=20 >=20 >=20 >=20 > Configuring >=20 > Please locate this piece of the sourcecode below in each of these main pr= ograms "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENC= RYPTIONS_MARK_0" program.=20 >=20 >=20 >=20 > FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS >=20 > NumOut: Integer; >=20 >=20 >=20 > BEGIN --Compose_CipherText_Items; >=20 >=20 >=20 > CASE NumIn IS >=20 > =20 >=20 > WHEN 1 =3D> NumOut:=3D Pn(1)+ Hash_2(Count); -- these >=20 > WHEN 2 =3D> NumOut:=3D Pn(2)+ Hash_11(Count); >=20 > WHEN 3 =3D> NumOut:=3D Pn(3)+ Hash_12(Count); >=20 > WHEN OTHERS =3D> >=20 > Ada.Text_IO. Put (Item =3D> "Forget it "); >=20 > END CASE; >=20 > RETURN NumOut; >=20 >=20 >=20 > END Compose_CipherText_Items; >=20 >=20 >=20 > *The focus is on the key information 'Hash_n' above. >=20 >=20 >=20 > Note :- there are 12 distinct Hash programs available within the software= program arrays and taken 3 at a time this enables 12!(factorial)/3!(factor= ial) different permutations of settings =3D> The Ada 'Case' Package may th= erefore have close on 80 million distinct Hash settings. - Choose one permu= tation as above and insert this into the programs NAMED in capitals above- = this configures your software uniquely. >=20 >=20 >=20 > Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" pl= ease find these lines and make the exact same changes as you did in the oth= er programs. >=20 >=20 >=20 > Pn(1):=3D W(1) - Hash_2(Count); -- change these also >=20 > Pn(2):=3D W(2) - Hash_11(Count);=20 >=20 > Pn(3):=3D W(3) - Hash_12(Count); >=20 >=20 >=20 > When all of this is done the two configured softwares will be identical a= nd will comprise the "Mutual Databases" described in the User-Guide. >=20 > =20 >=20 > You can do this as often as you wish and create as many secure loops with= other people as you like (before I call time on the copyright (much later)= - maybe !.) >=20 >=20 >=20 > *Important - You should immediately test your configuration changes by te= st-running the prepared batch files of plaintext that are provided. =3D> En= crypt and immediately Decrypt at least some of the test files as well as al= so simulating a trial 'Email' program. >=20 >=20 >=20 > Note also, in addition to this (i.e. uniquely configuring mutual database= s) you can still configure the installed 'Key Pad' in the open source code = Ada-95 program as often as you think fit in interim daily encryption work s= essions . >=20 >=20 >=20 > As long as the entities keep their mutual databases safe from common crim= inal theft (ordinary good housekeeping) you can enjoy perfect secrecy of co= mmunications for evermore. >=20 >=20 >=20 > The ciphertext string is a string of large (7 digits) integers and it tra= vels from Alice to Bob as a pasted attachment to an unsecured email. Perio= dic parameter changes in the 'Ked Pad' may go unsecured also (but you may = prefer them encrypted - so be it also). >=20 >=20 >=20 > Enjoy, >=20 >=20 >=20 > I can be contacted on this URL :- austin.obyrne@hotmail.com >=20 >=20 >=20 > adacrypt. >=20 >=20 >=20 > ---------------------------------------------------------- I have accidentally overstated the permutation space . It should read 12!/(= 12 -3)! or 1320 - this is still quite Ok. adacrypt