From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.182.104.70 with SMTP id gc6mr15819856obb.35.1392829084840; Wed, 19 Feb 2014 08:58:04 -0800 (PST) X-Received: by 10.140.49.175 with SMTP id q44mr17369qga.39.1392829084810; Wed, 19 Feb 2014 08:58:04 -0800 (PST) Path: border1.nntp.dca3.giganews.com!backlog3.nntp.dca3.giganews.com!border3.nntp.dca.giganews.com!border1.nntp.dca.giganews.com!nntp.giganews.com!uq10no29923253igb.0!news-out.google.com!dr7ni182qab.1!nntp.google.com!f11no24263801qae.1!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Wed, 19 Feb 2014 08:58:04 -0800 (PST) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=193.59.74.162; posting-account=nuF4hQoAAADjc2KKS1rOkzxWWEmaDrvx NNTP-Posting-Host: 193.59.74.162 References: User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: Subject: Re: Vector Cryptography - The User, the Interface, and Ada-95. From: darkestkhan Injection-Date: Wed, 19 Feb 2014 16:58:04 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-Original-Bytes: 3237 Xref: number.nntp.dca.giganews.com comp.lang.ada:185000 Date: 2014-02-19T08:58:04-08:00 List-Id: On Wednesday, February 19, 2014 2:09:04 PM UTC, Austin Obyrne wrote: > > The only requirement is that batch files must have a .txt file extension = (dot txt). > Why it wouldn't work on any other filetype? What if I rename .jpg to .txt? = What is .txt (texture?) ? >=20 > Any of these activities may be summarily truncated ad hoc by the user in = the middle of a work session. It is then copy 'n pasted into a general tex= t editor, saved as a file for encryption, encrypted and saved as a file of = ciphertext - all of this takes just seconds in most cases.=20 >=20 > I suppose our definitions of second are different. >=20 > The same file is retrieved by symmetrically inverting the foregoing proce= dure and continuing the object work where the user left off. >=20 >=20 >=20 > * There is no need for handpicked graduates to perform essential platform= work before the encryption proper begins as in some other ciphers. >=20 What does this even mean? >=20 >=20 > The Ada language is consider ideal for this cryptography because of the v= ery large arrays that must be made available for calling ad hoc (in the win= gs) and for loading (and simultaneously scrambling) into the ready-to-use p= rogram source code arrays just before run time when the computer 'boots up'= . >=20 >=20 >=20 > All other languages have large containers that can also do this but at a = price. The Ada packages are ideal in my view for coping with this common p= roblem. >=20 >=20 >=20 > Fee paying students from overseas should expect to spend at least one yea= r learning the vector mathematics of the cryptography as well as learning t= he Ada programming of the ciphers at the same time. >=20 >=20 Another paragraph I don't understand. What about fee paying students from y= our $COUNTRY_OF_ORIGIN ? >=20 > There is a year's hard work in it for anybody. I'm sorry, but this message is very hard to understand - as if it was taken= out of context.