From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.182.2.39 with SMTP id 7mr14885850obr.45.1417784574459; Fri, 05 Dec 2014 05:02:54 -0800 (PST) X-Received: by 10.140.102.211 with SMTP id w77mr4584qge.28.1417784574222; Fri, 05 Dec 2014 05:02:54 -0800 (PST) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!mx02.eternal-september.org!feeder.eternal-september.org!news.glorb.com!h15no4772673igd.0!news-out.google.com!n9ni21qai.0!nntp.google.com!w8no4778568qac.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Fri, 5 Dec 2014 05:02:53 -0800 (PST) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=81.154.71.132; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg NNTP-Posting-Host: 81.154.71.132 References: <16bc91a8-7d25-4b39-a88c-3423e5bdecf4@googlegroups.com> <587e236f-123f-4897-b73e-264082a62806@googlegroups.com> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: Subject: Re: The enormous potential that programming LaTeX in Ada presents. From: Austin Obyrne Injection-Date: Fri, 05 Dec 2014 13:02:54 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Xref: news.eternal-september.org comp.lang.ada:23879 Date: 2014-12-05T05:02:53-08:00 List-Id: On Thursday, December 4, 2014 3:25:46 PM UTC, Simon Wright wrote: > Austin Obyrne writes: >=20 > > Current cryptography is capable of encrypting ASCII and at most the > > entire Latin-1 set. >=20 > Looking back on Google I see that on 16 December 2013 I posted=20 > https://groups.google.com/d/msg/comp.lang.ada/qJ5vpRQarSQ/QNvyYgYVjewJ > which I've copied below. >=20 > So a year ago I demonstrated that >=20 > - minor tweaks will enable your code to: >=20 > - deal with data on Windows and Unix systems and to transfer data > between them, and >=20 > - deal with binary data, >=20 > - but the cipertext is >30 times the size of the original (because you > encode each byte of the input as 3 integers, represented as text). >=20 > These are practical matters and have nothing to do with the validity of > the encryption technology. >=20 > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > Austin Obyrne writes:=20 >=20 > > The transition of this crypto from Windows to Mac is quite something=20 > > and to my limited experience is a formidable task.=20 >=20 > No.=20 >=20 > I've put extensions at [1]; the README.txt says=20 >=20 > ------------------------------------------------------------------------= =20 > The files here are intended to work with the SureCrypt software from=20 > http://www.adacryptpages.com. They are written against version 85610,=20 > and are relatively minor modifications of that software, so the=20 > copyright status remains that of the original (Copyright =A9 2003 Austin= =20 > O'Byrne).=20 >=20 > There are two new programs: encrypt and decrypt.=20 >=20 > Encrypt usage:=20 >=20 > encrypt original-plaintext ciphertext=20 >=20 > Decrypt usage:=20 >=20 > decrypt ciphertext decrypted-plaintext=20 >=20 > Note that in spite of the use of the word "text" above the programs=20 > will work with binary data.=20 >=20 > The programs will work on Unix and Windows systems. Data encrypted on=20 > one can be decrypted on the other if required.=20 >=20 > Using a recent GNAT compiler, the programs can be built using the=20 > supplied cipher.gpr:=20 >=20 > gnatmake -p -P cipher=20 >=20 > Simon Wright=20 > si...@pushface.org=20 > December 2013=20 > ------------------------------------------------------------------------= =20 >=20 > From the software point of view, note that on Linux (which has a=20 > case-sensitive file system) you should use lower case for Ada source=20 > file names, so that, for example, Alices_Digital_Signature.ads becomes=20 > alices_digital_signature.ads.=20 >=20 > From the practical point of view, I think that the size of the encrypted= =20 > files will be a serious issue. With the current code, they come out=20 > *more* *than* *30* *times* the size of the original, so that the=20 > encrypted SureCrypt85610.zip comes out at about 870 megabytes. Even if=20 > you output the encrypted data in binary the multiplier will be 12 (each= =20 > byte of the original is encrypted as 3 integers).=20 >=20 > [1] https://www.dropbox.com/sh/a84i0jb8jv48nev/Q143ubNUWC=20 > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D I value your feedback greatly to the extent that I am archiving it as evide= nce to others - Austin