comp.lang.ada
 help / color / mirror / Atom feed
From: Denis McMahon <denismfmcmahon@gmail.com>
Subject: Re: The enormous potential that programming LaTeX in Ada presents.
Date: Wed, 3 Dec 2014 14:24:07 +0000 (UTC)
Date: 2014-12-03T14:24:07+00:00	[thread overview]
Message-ID: <m5n6e7$125$2@dont-email.me> (raw)
In-Reply-To: bed27be8-5d79-4fca-982e-8e358d19a304@googlegroups.com

On Tue, 02 Dec 2014 03:57:04 -0800, Austin Obyrne wrote:

> Latex is a typesetting language that can be encrypted by an Ada program
> and then securely decrypted back to its LaTeX input file format at the
> receiving end.

A competent encryption / decryption system can encrypt and decrypt any 
stream of data, which is to say any arbitrarily long sequence of bits, in 
other words any file.

The format of the input file should be irrelevant, if the format of the 
input file is not irrelevant the first attack vector is that you know 
that the decrypted data has a specific format, and you look for clues in 
the ciphertext that might relate to the format of the input file.

So, it should not matter whether your plaintext is 7 bit ascii, a 
picture, a compressed zip archive of the cia's darkest secrets or Malia 
Obamas twitter account, if you run these through a good encryption 
algorithm an attacker should be unable to tell, even in possession of the 
encryption and decryption algorithms, what the format of the source data 
was, or even how long it was (but it's reasonable to deduce it's no 
longer than the ciphertext).

You seem convinced that your technique is in some way much more 
inherently secure than anything that has gone before. This presumes that 
there is some flaw in all that has gone before that you can not only 
prove mathematically, but can prove by demonstrating an infallible attack 
on the ciphertext to generate the plaintext.

If this is indeed the case, I am sure there are many publications 
queueing up to publish your paper demonstrating the fallibility of 
currently adopted encryption systems. Perhaps instead of trying to invent 
a totally new encryption method, you should concentrate on alerting 
people to the flaws in the existing system, and then you could present 
your system as the solution to the problem when asked "ok, you've proved 
the current algorithms are broken, how do we fix them?"

-- 
Denis McMahon, denismfmcmahon@gmail.com


  parent reply	other threads:[~2014-12-03 14:24 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-12-02 11:57 The enormous potential that programming LaTeX in Ada presents Austin Obyrne
2014-12-02 14:07 ` David Botton
2014-12-02 14:49   ` Austin Obyrne
2014-12-03  3:52 ` Dennis Lee Bieber
2014-12-03 12:01 ` robin.vowels
2014-12-03 14:24 ` Denis McMahon [this message]
2014-12-03 15:54   ` Peter Chapin
2014-12-03 15:53 ` johannes falcone
2014-12-03 16:12 ` gautier_niouzes
2014-12-03 20:48   ` Austin Obyrne
2014-12-03 20:57     ` Pascal Obry
2014-12-03 22:39       ` mrvmurray
2014-12-03 22:29     ` mrvmurray
2014-12-03 22:34     ` Denis McMahon
2014-12-04  8:26       ` Austin Obyrne
2014-12-04  8:37         ` mrvmurray
2014-12-04 23:38         ` Shark8
2014-12-04  3:41     ` Dennis Lee Bieber
2014-12-05  7:04       ` Nasser M. Abbasi
2014-12-05 16:59         ` Dennis Lee Bieber
2014-12-04 15:25     ` Simon Wright
2014-12-04 16:31       ` Austin Obyrne
2014-12-04 18:24         ` Austin Obyrne
2014-12-05  8:21         ` mrvmurray
2014-12-05 18:42           ` Denis McMahon
2014-12-05 13:02       ` Austin Obyrne
2014-12-05 20:09         ` mrvmurray
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox