comp.lang.ada
 help / color / mirror / Atom feed
* A matter of interest.
@ 2014-11-30 12:10 Austin Obyrne
  2014-11-30 12:49 ` Simon Wright
  0 siblings, 1 reply; 16+ messages in thread
From: Austin Obyrne @ 2014-11-30 12:10 UTC (permalink / raw)



I have been experimenting in the last few days with a new version of some vector cryptography that I invented some years ago.

The particular cipher computer program I am referring to is written in Ada-95 for MS Windows XP Vista 7 & 8 (*runs on hand held tablets MS Surface Pro 2 & 3)

My normal test programs that I use as test/tutorials are named PlainTextFile_1.dat increasing in sizes 9,100, 500,1000,2000,4000,10000, 30000 where the size of the file is that number of ASCII plaintext characters for encryption in that test file.

For good measure I decided to add another file of 50000 characters in this new version under test but where to find a ready-made suitable test file of that size was my problem - keying in a file from scratch was just too time - consuming.  I looked around and found I had a file of Ada-95 source code in my  computer and decided to use that.

I want to report what happened next in case it might be useful to programmers of Ada.

The file of 49471 Ada sourcecode characters encrypted and decrypted perfectly which I knew it would anyway so I decided next I would test the fidelity (a privately coined word that I think is apt but is not normal crypto jargon just for your info) of the entire experiment in cryptology by test-running the decrypted source code as (message-text now) in my Ada-Gide editor - it compiled and ran perfectly without any editing and immediately encrypted some test programs itself.  

I am very pleased with this result for obvious reasons - compiling first time round in an Ada compiler must be the most stringent test of unadulterated transport imaginable.

The reason I am posting this article is to make these points :-

*1) Programmers of any language may remotely post their stuff verbatim to others with impunity using Ada as the carrier.

*2) Cryptographers may use Ada to send encrypted ciphers to others verbatim and know that they will work - there is no more secure method of secure transport and they will only need to periodically update the keys (which may be public or encrypted as preferred, periodically) the initial delivery of the mutual database must be made in a one-off secure courier delivery of course.

I hope it is in order for me to post a crypto article here bearing in mind that you guys are in a programming language usenet.

The host cipher is on offer to all.

Regards to all,

Adacrypt.

^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2014-12-03  3:40 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-11-30 12:10 A matter of interest Austin Obyrne
2014-11-30 12:49 ` Simon Wright
2014-11-30 13:24   ` Austin Obyrne
2014-11-30 16:09     ` Björn Lundin
2014-11-30 17:07       ` brbarkstrom
2014-11-30 18:12         ` Simon Wright
2014-11-30 19:56           ` brbarkstrom
2014-12-01 16:24             ` Denis McMahon
2014-12-01 20:29               ` Austin Obyrne
2014-12-01 23:49                 ` Jeffrey Carter
2014-12-02  2:24                   ` David Botton
2014-12-02  7:52                     ` mrvmurray
2014-12-02  2:43                   ` Austin Obyrne
2014-12-03  3:40                     ` Dennis Lee Bieber
2014-12-01 19:36             ` Eryndlia Mavourneen
2014-12-01 19:48               ` mrvmurray

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox