From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM, FREEMAIL_REPLY autolearn=no autolearn_force=no version=3.4.4 X-Received: by 10.236.223.198 with SMTP id v66mr5099512yhp.21.1418976578552; Fri, 19 Dec 2014 00:09:38 -0800 (PST) X-Received: by 10.140.94.150 with SMTP id g22mr121006qge.0.1418976578535; Fri, 19 Dec 2014 00:09:38 -0800 (PST) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!mx02.eternal-september.org!feeder.eternal-september.org!usenet.blueworldhosting.com!feeder01.blueworldhosting.com!peer01.iad.highwinds-media.com!news.highwinds-media.com!feed-me.highwinds-media.com!dc16no126325qab.1!news-out.google.com!r1ni70qat.1!nntp.google.com!i13no544332qae.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Fri, 19 Dec 2014 00:09:38 -0800 (PST) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=5.80.153.30; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg NNTP-Posting-Host: 5.80.153.30 References: <1a2fea61-bcc1-43a9-b6e3-edf474308402@googlegroups.com> <021184f0-18ef-40bc-ba62-fd307998fe1c@googlegroups.com> <793614d3-4219-4cca-9078-24a5d50c6ef5@googlegroups.com> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: Subject: Re: Ada Connections to this Crypto. From: Austin Obyrne Injection-Date: Fri, 19 Dec 2014 08:09:38 +0000 Content-Type: text/plain; charset=ISO-8859-1 X-Received-Bytes: 2528 X-Received-Body-CRC: 3649352752 Xref: news.eternal-september.org comp.lang.ada:24132 Date: 2014-12-19T00:09:38-08:00 List-Id: On Thursday, December 18, 2014 11:25:36 PM UTC, Denis McMahon wrote: > On Wed, 17 Dec 2014 23:37:05 -0800, Austin Obyrne wrote: > > > I am prepared to send you a batch of ciphertext for brute forcing if you > > can set up an honest adjudicating team who will oversee it for fair > > play. > > What adjudicating team do you need? The fact that the plaintext can be > created from the ciphertext is sufficient to prove the brute force attack. > > Publishing the plaintext (or a link to it) here here would be proof of > the success of the bruteforce attack. > > To put it another way, if all you supply me with is the ciphertext and I > can publish the plaintext, then obviously the cipher has failed! > > -- > Denis McMahon, denismfmcmahon@gmail.com Yeah, that is what I also maintain but this fellow claims he was cheated in a similiar experiment some years ago. I mean to close the escape route this time by engaging outsiders to monitor the situation. Let me know if you want me to go ahead - shall I send you a small batch of ciphertext ? - Austin O' Byrne