From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,2a047f145f6e6fed,start X-Google-NewGroupId: yes X-Google-Attributes: gida07f3367d7,domainid0,public,usenet X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news2.google.com!postnews.google.com!j4g2000yqh.googlegroups.com!not-for-mail From: adacrypt Newsgroups: comp.lang.ada Subject: What Ada can do for Cryptography. Date: Fri, 18 Jun 2010 02:57:54 -0700 (PDT) Organization: http://groups.google.com Message-ID: NNTP-Posting-Host: 81.151.235.215 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Trace: posting.google.com 1276855074 20967 127.0.0.1 (18 Jun 2010 09:57:54 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Fri, 18 Jun 2010 09:57:54 +0000 (UTC) Complaints-To: groups-abuse@google.com Injection-Info: j4g2000yqh.googlegroups.com; posting-host=81.151.235.215; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; GTB6.5; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729),gzip(gfe) Xref: g2news2.google.com comp.lang.ada:12785 Date: 2010-06-18T02:57:54-07:00 List-Id: The cryptographical strength of a cipher is the last ditch strength of the cipher and this is provided by the mathematical algorithm that underpins the core. It is to be taken that this fundamental to all else. The management of the network infrastructure however comes soon after this in importance in my view and it is thought that Ada has a lot to offer here. It is well known the bug free stability that Ada gives to the enormously important safety critical operations in aviation and air traffic control. On top of that in cryptography, ada is perceived to be very portable in that the component packages that comprise the bulk of a secure communications loop are well within the scope of non- specialist operatives who may work in batch mode off line creating libraries etc using the Ada programming language with minimal knowledge of Ada per se. It is very early days for both the vector cryptography that I have invented and the use of Ada in the crypto industry so it may take some time before any heads are turned to look at both of these. - adacrypt