From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!mx02.eternal-september.org!feeder.eternal-september.org!news.glorb.com!peer01.iad.highwinds-media.com!news.highwinds-media.com!feed-me.highwinds-media.com!Xl.tags.giganews.com!border1.nntp.dca1.giganews.com!nntp.giganews.com!local2.nntp.dca.giganews.com!news.giganews.com.POSTED!not-for-mail NNTP-Posting-Date: Wed, 03 Dec 2014 09:54:25 -0600 Newsgroups: comp.lang.ada Date: Wed, 3 Dec 2014 10:54:22 -0500 From: Peter Chapin X-X-Sender: pcc09070@WIL414CHAPIN.vtc.vsc.edu Subject: Re: The enormous potential that programming LaTeX in Ada presents. In-Reply-To: Message-ID: References: User-Agent: Alpine 2.11 (CYG 23 2013-08-11) Organization: Vermont Technical College MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Usenet-Provider: http://www.giganews.com X-Trace: sv3-Auh6EuNmlNa0R/egbnqQ3Q+t09NbwR0c8X0NB0V/sszBsP1j1ke2CNzowMkVzk40VFwllm0LefoKTau!z85kpquSn4DLkqG/H2xjFtyg+hz0denZN4cpcK1Q6wYGQBFnJjMHj/c4zWzRM4SZbYtlP8pVgdQa!/MafKnvnJhMhPaaWgg== X-Complaints-To: abuse@giganews.com X-DMCA-Notifications: http://www.giganews.com/info/dmca.html X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly X-Postfilter: 1.3.40 X-Original-Bytes: 2238 X-Received-Bytes: 2350 X-Received-Body-CRC: 856552951 Xref: news.eternal-september.org comp.lang.ada:23839 Date: 2014-12-03T10:54:22-05:00 List-Id: On Wed, 3 Dec 2014, Denis McMahon wrote: > So, it should not matter whether your plaintext is 7 bit ascii, a > picture, a compressed zip archive of the cia's darkest secrets or Malia > Obamas twitter account, if you run these through a good encryption > algorithm an attacker should be unable to tell, even in possession of > the encryption and decryption algorithms, what the format of the source > data was, or even how long it was (but it's reasonable to deduce it's no > longer than the ciphertext). In many applications of cryptography the plaintext is compressed before it is encrypted so, in fact, it is fairly common for the plaintext to be longer than the ciphertext. This is done because the compression "randomizes" the statistics of the data input to the encryption algorithm and can make the encryption harder to defeat... even if the attacker knows the compression has occurred and what compression algorithm was used. Peter