From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.66.124.168 with SMTP id mj8mr58875767pab.32.1417462598828; Mon, 01 Dec 2014 11:36:38 -0800 (PST) X-Received: by 10.140.91.35 with SMTP id y32mr34691qgd.25.1417462598780; Mon, 01 Dec 2014 11:36:38 -0800 (PST) Path: border1.nntp.dca1.giganews.com!nntp.giganews.com!h15no11515903igd.0!news-out.google.com!m4ni588qag.1!nntp.google.com!s7no3423420qap.1!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Mon, 1 Dec 2014 11:36:38 -0800 (PST) In-Reply-To: <216acc31-ae0f-48cd-bccb-2dd93d88791e@googlegroups.com> Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=74.51.2.10; posting-account=7Oy7OQoAAABhVYFOo553Cn1-AaU-bSfl NNTP-Posting-Host: 74.51.2.10 References: <8f7e0b44-14a7-4e39-8910-d8f6e553b904@googlegroups.com> <2a3a193b-9ae3-421e-8017-972b926c5489@googlegroups.com> <216acc31-ae0f-48cd-bccb-2dd93d88791e@googlegroups.com> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <7b77968a-697b-4ea8-a57f-145e2526560b@googlegroups.com> Subject: Re: A matter of interest. From: Eryndlia Mavourneen Injection-Date: Mon, 01 Dec 2014 19:36:38 +0000 Content-Type: text/plain; charset=ISO-8859-1 Xref: number.nntp.giganews.com comp.lang.ada:191118 Date: 2014-12-01T11:36:38-08:00 List-Id: On Sunday, November 30, 2014 1:56:10 PM UTC-6, brbar...@gmail.com wrote: > On Sunday, November 30, 2014 1:12:47 PM UTC-5, Simon Wright wrote: > > brbarkstrom writes: > > > > > I do not believe that a new cryptographic algorithm can be trusted > > > until it has been published and attacked by competent cryptanalysts. > > > The classic text is > > > > > > Schneier, B., 1996: Applied Cryptography: Protocols, Algorithms, > > > and Source Code in C, John Wiley & Sons, New York, NY > > > > > > If the algorithm hasn't been published, the usual term would be > > > "security by obscurity." It doesn't work. > > > > To be fair to Austin, he has published his work-in-progress. > > Fair enough. However, I think he should use the available Ada versions > of standard encryption algorithms. Those will save his time and worries > about security by the user community. While I have a PhD in astronomy and > had several years of advanced math as an undergraduate, I do not have the > mathematical qualifications to build a new encryption algorithm. Folks > who do that kind of work need to have a very deep understanding of number > theory and related subjects. 'Nuff said. > > Bruce B. As I recall, the situation is reversed: Austin is a mathematician and not a programmer much less a professional Ada developer.