From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,FORGED_GMAIL_RCVD, FREEMAIL_FROM autolearn=no autolearn_force=no version=3.4.4 X-Google-Thread: a07f3367d7,f080b438950a7996,start X-Google-Attributes: gida07f3367d7,public,usenet X-Google-NewGroupId: yes X-Google-Language: ENGLISH,ASCII-7-bit Received: by 10.205.116.5 with SMTP id fg5mr2255548bkc.3.1320139176373; Tue, 01 Nov 2011 02:19:36 -0700 (PDT) Path: l23ni41449bkv.0!nntp.google.com!news1.google.com!postnews.google.com!es7g2000vbb.googlegroups.com!not-for-mail From: leonid Newsgroups: comp.lang.ada Subject: ADASTUDIO 2011 to be or not to be Date: Tue, 1 Nov 2011 02:18:07 -0700 (PDT) Organization: http://groups.google.com Message-ID: <889033c6-baf1-4d54-b19f-1f1add625f96@es7g2000vbb.googlegroups.com> NNTP-Posting-Host: 94.230.87.133 Mime-Version: 1.0 X-Trace: posting.google.com 1320139088 2358 127.0.0.1 (1 Nov 2011 09:18:08 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Tue, 1 Nov 2011 09:18:08 +0000 (UTC) Complaints-To: groups-abuse@google.com Injection-Info: es7g2000vbb.googlegroups.com; posting-host=94.230.87.133; posting-account=gOkKbAoAAACKpspXTBDXeWNsiTyhFowY User-Agent: G2/1.0 X-Google-Web-Client: true X-Google-Header-Order: HUALESNKRC X-HTTP-UserAgent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0.1) Gecko/20100101 Firefox/7.0.1,gzip(gfe) Xref: news1.google.com comp.lang.ada:18773 Content-Type: text/plain; charset=ISO-8859-1 Date: 2011-11-01T02:18:07-07:00 List-Id: Dear Colleagues. I turn to you with the following question - Does anyone use ADASTUDIO2011 in their projects, or it is dead born child, that is possible. If you does, what are the problems or requests you have, and if not, then I'll get to the problems of information security. In particular, what do you think about the following scheme: User A encrypts the message quantum with random key and sends it to B. He encrypts his random key and returns the A, A decrypts and sends B, decrypts, reads, and sends a confirmation generated by the new random keys. Than you. Leonid