comp.lang.ada
 help / color / mirror / Atom feed
From: Austin Obyrne <austin.obyrne@hotmail.com>
Subject: A matter of interest.
Date: Sun, 30 Nov 2014 04:10:26 -0800 (PST)
Date: 2014-11-30T04:10:26-08:00	[thread overview]
Message-ID: <8f7e0b44-14a7-4e39-8910-d8f6e553b904@googlegroups.com> (raw)


I have been experimenting in the last few days with a new version of some vector cryptography that I invented some years ago.

The particular cipher computer program I am referring to is written in Ada-95 for MS Windows XP Vista 7 & 8 (*runs on hand held tablets MS Surface Pro 2 & 3)

My normal test programs that I use as test/tutorials are named PlainTextFile_1.dat increasing in sizes 9,100, 500,1000,2000,4000,10000, 30000 where the size of the file is that number of ASCII plaintext characters for encryption in that test file.

For good measure I decided to add another file of 50000 characters in this new version under test but where to find a ready-made suitable test file of that size was my problem - keying in a file from scratch was just too time - consuming.  I looked around and found I had a file of Ada-95 source code in my  computer and decided to use that.

I want to report what happened next in case it might be useful to programmers of Ada.

The file of 49471 Ada sourcecode characters encrypted and decrypted perfectly which I knew it would anyway so I decided next I would test the fidelity (a privately coined word that I think is apt but is not normal crypto jargon just for your info) of the entire experiment in cryptology by test-running the decrypted source code as (message-text now) in my Ada-Gide editor - it compiled and ran perfectly without any editing and immediately encrypted some test programs itself.  

I am very pleased with this result for obvious reasons - compiling first time round in an Ada compiler must be the most stringent test of unadulterated transport imaginable.

The reason I am posting this article is to make these points :-

*1) Programmers of any language may remotely post their stuff verbatim to others with impunity using Ada as the carrier.

*2) Cryptographers may use Ada to send encrypted ciphers to others verbatim and know that they will work - there is no more secure method of secure transport and they will only need to periodically update the keys (which may be public or encrypted as preferred, periodically) the initial delivery of the mutual database must be made in a one-off secure courier delivery of course.

I hope it is in order for me to post a crypto article here bearing in mind that you guys are in a programming language usenet.

The host cipher is on offer to all.

Regards to all,

Adacrypt.

             reply	other threads:[~2014-11-30 12:10 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-11-30 12:10 Austin Obyrne [this message]
2014-11-30 12:49 ` A matter of interest Simon Wright
2014-11-30 13:24   ` Austin Obyrne
2014-11-30 16:09     ` Björn Lundin
2014-11-30 17:07       ` brbarkstrom
2014-11-30 18:12         ` Simon Wright
2014-11-30 19:56           ` brbarkstrom
2014-12-01 16:24             ` Denis McMahon
2014-12-01 20:29               ` Austin Obyrne
2014-12-01 23:49                 ` Jeffrey Carter
2014-12-02  2:24                   ` David Botton
2014-12-02  7:52                     ` mrvmurray
2014-12-02  2:43                   ` Austin Obyrne
2014-12-03  3:40                     ` Dennis Lee Bieber
2014-12-01 19:36             ` Eryndlia Mavourneen
2014-12-01 19:48               ` mrvmurray
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox