From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.52.37.33 with SMTP id v1mr13426577vdj.1.1392818945050; Wed, 19 Feb 2014 06:09:05 -0800 (PST) X-Received: by 10.140.94.11 with SMTP id f11mr238392qge.7.1392818945010; Wed, 19 Feb 2014 06:09:05 -0800 (PST) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.glorb.com!f11no24186036qae.1!news-out.google.com!s3ni24178qas.0!nntp.google.com!k15no24159360qaq.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Wed, 19 Feb 2014 06:09:04 -0800 (PST) Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=86.146.23.128; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg NNTP-Posting-Host: 86.146.23.128 User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: Subject: Vector Cryptography - The User, the Interface, and Ada-95. From: Austin Obyrne Injection-Date: Wed, 19 Feb 2014 14:09:05 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Xref: news.eternal-september.org comp.lang.ada:18666 Date: 2014-02-19T06:09:04-08:00 List-Id: The user of this cryptography can be introduced to it in a few minutes and = does not need to know anything about cryptography or vector mathematics and= only enough keyboard skills to be able to make very minor changes to some = well-highlighted parameters in the declarations box of the cipher program.= =20 The cipher program is written in the Ada-95 programming language. Encryption is done either on batch files (i.e. files created at another tim= e and possibly place) or interactively in real time as say in email mode. The only requirement is that batch files must have a .txt file extension (d= ot txt). A user may be any person who is doing an activity that might be ordinary wo= rd processing, website programming, computer language programming. Any of these activities may be summarily truncated ad hoc by the user in th= e middle of a work session. It is then copy 'n pasted into a general text = editor, saved as a file for encryption, encrypted and saved as a file of ci= phertext - all of this takes just seconds in most cases.=20 The same file is retrieved by symmetrically inverting the foregoing procedu= re and continuing the object work where the user left off. * There is no need for handpicked graduates to perform essential platform w= ork before the encryption proper begins as in some other ciphers. The Ada language is consider ideal for this cryptography because of the ver= y large arrays that must be made available for calling ad hoc (in the wings= ) and for loading (and simultaneously scrambling) into the ready-to-use pro= gram source code arrays just before run time when the computer 'boots up'. All other languages have large containers that can also do this but at a pr= ice. The Ada packages are ideal in my view for coping with this common pro= blem. Fee paying students from overseas should expect to spend at least one year = learning the vector mathematics of the cryptography as well as learning the= Ada programming of the ciphers at the same time. There is a year's hard work in it for anybody. Good luck all. adacrypt