Rocksolid Light

OCTADE

mail  files  register  groups  login

Message-ID:  


USENET / sci.crypt / Re: Patterns


Pages:12
Re: Patterns

<uqj7eo$2q28i$3@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=166&group=sci.crypt#166

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Wed, 14 Feb 2024 12:22:48 -0800
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <uqj7eo$2q28i$3@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 14 Feb 2024 20:22:48 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="45095f52c73b7367c090d0e10429090a";
logging-data="2951442"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19vDt7lF93pTEJyyTCreY82dtEkRYyLo2o="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:VqtyNgI6zlIm1OpIC6MFQo0wDd8=
Content-Language: en-US
In-Reply-To: <uqhgi2$2gjm1$2@dont-email.me>
 by: Chris M. Thomasson - Wed, 14 Feb 2024 20:22 UTC

On 2/13/2024 8:45 PM, Rich wrote:
> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>> Deos anyone how what encryption is being used here?
>>>
>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>
>> None? lol. just kidding. Humm...
>>
>> Some combination of plaintext, secret key and cipher algorithm
>> generated it. Probably, the plaintext was hand crafted? ;^)
>
> As Jacob correctly pointed out, if one knows the message, one can then
> 'hand craft' a one-time-pad to generate exactly this output from that
> message.

Or even the other way around? If one knows the OTP (Bob and/or Alice),
they can create a special plaintext that generates this output for fun.

> The usual issues with getting the OTP to Bob so Bob can
> decrypt still apply.

Indeed.

Re: Patterns

<uqln3h$2pbms$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=167&group=sci.crypt#167

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 15 Feb 2024 20:02:08 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqln3h$2pbms$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 15 Feb 2024 19:02:09 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2928348"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Thu, 15 Feb 2024 19:02 UTC

Chris M. Thomasson wrote:

> On 2/13/2024 8:45 PM, Rich wrote:
> > In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
> > wrote:
> >> On 2/12/2024 5:30 PM, The Doctor wrote:
> >>> Deos anyone how what encryption is being used here?
> >>>
> >>> *1234567890ABCDEF01234567890ABCDEF0123456
> >>
> >> None? lol. just kidding. Humm...
> >>
> >> Some combination of plaintext, secret key and cipher algorithm
> >> generated it. Probably, the plaintext was hand crafted? ;^)
> >
> > As Jacob correctly pointed out, if one knows the message, one can
> > then 'hand craft' a one-time-pad to generate exactly this output
> > from that message.
>
> Or even the other way around? If one knows the OTP (Bob and/or
> Alice), they can create a special plaintext that generates this
> output for fun.

How would you do this? I mean the OP IMHO does not show an encrypted
string, done with an OTP. OTPs nature is that it does not include
patterns and is totally random.

Even if this string is not encrypted and only encoded, how would one
get such pattern from plain text and convert it back to plain text?

It had been best if the OP had posted a reference URL ...

Regards
Stefan
--
----Ed25519 Signature----
924d68b09939ff530a360fb2865c20195c09f0c0278c1e189d9a2ec3d036d252
c1fb0947cde91b30f3a85319c063eb0d72fce5b739a2bd9ea09bc55bb65e4e01

Re: Patterns

<uqlrlj$2pi12$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=168&group=sci.crypt#168

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 15 Feb 2024 21:20:03 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqlrlj$2pi12$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<uqlq0s$3f0e5$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 15 Feb 2024 20:20:04 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2934818"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
 by: Stefan Claas - Thu, 15 Feb 2024 20:20 UTC

Rich wrote:

> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> > Chris M. Thomasson wrote:

> >> Or even the other way around? If one knows the OTP (Bob and/or
> >> Alice), they can create a special plaintext that generates this
> >> output for fun.
> >
> > How would you do this?
>
> For a traditional, 1940's substution style OTP, it is trivial:
>
> Message: The
>
> Pad:
>
> T=H
> e=r
> h=e
>
> Substitute using the pad, get the encrypted message: Her

Well, one uses a substitution table, trigraph, etc. and then
a pad to encrypt the message. Otherwise it would be a plain
text encoded message, right?
> > It had been best if the OP had posted a reference URL ...
>
> I doubt OP found the string at some URL. I suspect the OP was
> trolling.

That was my thought too and the reason why I did not reply to him
directly.

Regards
Stefan
--
----Ed25519 Signature----
cec364f80a628ea8fa2d4734e0cf804ad331b8d6f2e65c1f2f7441fc2728186c
2cc5ce7d3e5d69a80c0140c8973536ed840a5613f727eb5924612d392b7ea202

Re: Patterns

<uqmhtl$3ilmr$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=169&group=sci.crypt#169

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!nntp.comgw.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 15 Feb 2024 18:39:48 -0800
Organization: A noiseless patient Spider
Lines: 43
Message-ID: <uqmhtl$3ilmr$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 02:39:49 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="34f0c8e038f7a06168c763d47f140a42";
logging-data="3757787"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/LeC6ZPiVGoq7urXAqFxRfn4sK/S4kuI0="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:0rl7X17yDVUebWodopXuoQl0k8I=
Content-Language: en-US
In-Reply-To: <uqlrlj$2pi12$1@i2pn2.org>
 by: Chris M. Thomasson - Fri, 16 Feb 2024 02:39 UTC

On 2/15/2024 12:20 PM, Stefan Claas wrote:
> Rich wrote:
>
>> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
>>> Chris M. Thomasson wrote:
>
>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>> Alice), they can create a special plaintext that generates this
>>>> output for fun.
>>>
>>> How would you do this?
>>
>> For a traditional, 1940's substution style OTP, it is trivial:
>>
>> Message: The
>>
>> Pad:
>>
>> T=H
>> e=r
>> h=e
>>
>> Substitute using the pad, get the encrypted message: Her
>
> Well, one uses a substitution table, trigraph, etc. and then
> a pad to encrypt the message. Otherwise it would be a plain
> text encoded message, right?

Give me a OPT 3 bytes long. Creating a plaintext that results in a
ciphertext of say 123, or ABC is possible...

>
>>> It had been best if the OP had posted a reference URL ...
>>
>> I doubt OP found the string at some URL. I suspect the OP was
>> trolling.
>
> That was my thought too and the reason why I did not reply to him
> directly.
>
> Regards
> Stefan

Re: Patterns

<uqo45v$2sl5o$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=170&group=sci.crypt#170

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 17:57:32 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqo45v$2sl5o$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org>
<uqmhtl$3ilmr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 16:57:35 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3036344"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Fri, 16 Feb 2024 16:57 UTC

Chris M. Thomasson wrote:

> On 2/15/2024 12:20 PM, Stefan Claas wrote:
> > Rich wrote:
> >
> >> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> >>> Chris M. Thomasson wrote:
> >
> >>>> Or even the other way around? If one knows the OTP (Bob and/or
> >>>> Alice), they can create a special plaintext that generates this
> >>>> output for fun.
> >>>
> >>> How would you do this?
> >>
> >> For a traditional, 1940's substution style OTP, it is trivial:
> >>
> >> Message: The
> >>
> >> Pad:
> >>
> >> T=H
> >> e=r
> >> h=e
> >>
> >> Substitute using the pad, get the encrypted message: Her
> >
> > Well, one uses a substitution table, trigraph, etc. and then
> > a pad to encrypt the message. Otherwise it would be a plain
> > text encoded message, right?
>
> Give me a OPT 3 bytes long. Creating a plaintext that results in a
> ciphertext of say 123, or ABC is possible...

Yes, but then it is not OTP encryption and only plain code, done
with substitution, I would say. The OP's Subject: is Patterns.

Regards
Stefan
--
----Ed25519 Signature----
0722421a0b6680c4ade0fcaac8d76552cf746531dd89eeca1b7db32ecef8bceb
9c4ca60a0298d56bd96340d8a4a1b05bc4c38d6fcf13d8aa2633018b09f0ff0f

Re: Patterns

<uqo4p7$2sl5o$2@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=171&group=sci.crypt#171

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 18:07:48 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqo4p7$2sl5o$2@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org>
<uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 17:07:51 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3036344"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Fri, 16 Feb 2024 17:07 UTC

Stefan Claas wrote:

> Chris M. Thomasson wrote:
>
> > On 2/15/2024 12:20 PM, Stefan Claas wrote:
> > > Rich wrote:
> > >
> > >> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> > >>> Chris M. Thomasson wrote:
> > >
> > >>>> Or even the other way around? If one knows the OTP (Bob and/or
> > >>>> Alice), they can create a special plaintext that generates this
> > >>>> output for fun.
> > >>>
> > >>> How would you do this?
> > >>
> > >> For a traditional, 1940's substution style OTP, it is trivial:
> > >>
> > >> Message: The
> > >>
> > >> Pad:
> > >>
> > >> T=H
> > >> e=r
> > >> h=e
> > >>
> > >> Substitute using the pad, get the encrypted message: Her
> > >
> > > Well, one uses a substitution table, trigraph, etc. and then
> > > a pad to encrypt the message. Otherwise it would be a plain
> > > text encoded message, right?
> >
> > Give me a OPT 3 bytes long. Creating a plaintext that results in a
> > ciphertext of say 123, or ABC is possible...
>
> Yes, but then it is not OTP encryption and only plain code, done
> with substitution, I would say. The OP's Subject: is Patterns.

To be more clear, an OTP encrypted message with digits or letters
can of course include 3-5 letter words or a 3-5 digits sequence, but
in case of OTPs this means nothing and I would not call it pattern,
in an encrypted message.

Regards
Stefan
--
----Ed25519 Signature----
48c677c37bef1ad110bea0c0c42da8846f5b1e628b1b04d6f2400cc4696c5171
361fc85f7b1c3ebd65756278b51194f681428720b3b4360c13b7c3d306fd8d0f

Re: Patterns

<uqogdn$mfr$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=172&group=sci.crypt#172

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.samoylyk.net!usenet.goja.nl.eu.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 12:26:30 -0800
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <uqogdn$mfr$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org> <uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org> <uqo4p7$2sl5o$2@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 20:26:32 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="34f0c8e038f7a06168c763d47f140a42";
logging-data="23035"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/Ql51fWIDcUf0ShCidE+4y5vvDK68gCkA="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:AlqaDMCUl4TgNPZD2SeV2WVI0e4=
Content-Language: en-US
In-Reply-To: <uqo4p7$2sl5o$2@i2pn2.org>
 by: Chris M. Thomasson - Fri, 16 Feb 2024 20:26 UTC

On 2/16/2024 9:07 AM, Stefan Claas wrote:
> Stefan Claas wrote:
>
>> Chris M. Thomasson wrote:
>>
>>> On 2/15/2024 12:20 PM, Stefan Claas wrote:
>>>> Rich wrote:
>>>>
>>>>> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
>>>>>> Chris M. Thomasson wrote:
>>>>
>>>>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>>>>> Alice), they can create a special plaintext that generates this
>>>>>>> output for fun.
>>>>>>
>>>>>> How would you do this?
>>>>>
>>>>> For a traditional, 1940's substution style OTP, it is trivial:
>>>>>
>>>>> Message: The
>>>>>
>>>>> Pad:
>>>>>
>>>>> T=H
>>>>> e=r
>>>>> h=e
>>>>>
>>>>> Substitute using the pad, get the encrypted message: Her
>>>>
>>>> Well, one uses a substitution table, trigraph, etc. and then
>>>> a pad to encrypt the message. Otherwise it would be a plain
>>>> text encoded message, right?
>>>
>>> Give me a OPT 3 bytes long. Creating a plaintext that results in a
>>> ciphertext of say 123, or ABC is possible...
>>
>> Yes, but then it is not OTP encryption and only plain code, done
>> with substitution, I would say. The OP's Subject: is Patterns.
>
> To be more clear, an OTP encrypted message with digits or letters
> can of course include 3-5 letter words or a 3-5 digits sequence, but
> in case of OTPs this means nothing and I would not call it pattern,
> in an encrypted message.
>

AFAICT, it all boils down to fun with OTP's... ;^)

Re: Patterns

<uqp15c$3fmc$3@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=173&group=sci.crypt#173

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 17:12:11 -0800
Organization: A noiseless patient Spider
Lines: 66
Message-ID: <uqp15c$3fmc$3@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org> <uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org> <uqo4p7$2sl5o$2@i2pn2.org>
<uqogdn$mfr$1@dont-email.me> <uqoudq$35ch$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 17 Feb 2024 01:12:12 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="e1558c86d6e9f7b89dd43e324f783dc6";
logging-data="114380"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18BhzAr/qkoIMcvxg9/KwE2r/Z3+kc+kvA="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:5aEgflZFfOL8Q0EaK9UwZ+R5Jn8=
In-Reply-To: <uqoudq$35ch$1@dont-email.me>
Content-Language: en-US
 by: Chris M. Thomasson - Sat, 17 Feb 2024 01:12 UTC

On 2/16/2024 4:25 PM, William Unruh wrote:
> On 2024-02-16, Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 2/16/2024 9:07 AM, Stefan Claas wrote:
>>> Stefan Claas wrote:
>>>
>>>> Chris M. Thomasson wrote:
>>>>
>>>>> On 2/15/2024 12:20 PM, Stefan Claas wrote:
>>>>>> Rich wrote:
>>>>>>
>>>>>>> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
>>>>>>>> Chris M. Thomasson wrote:
>>>>>>
>>>>>>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>>>>>>> Alice), they can create a special plaintext that generates this
>>>>>>>>> output for fun.
>>>>>>>>
>>>>>>>> How would you do this?
>>>>>>>
>>>>>>> For a traditional, 1940's substution style OTP, it is trivial:
>>>>>>>
>>>>>>> Message: The
>>>>>>>
>>>>>>> Pad:
>>>>>>>
>>>>>>> T=H
>>>>>>> e=r
>>>>>>> h=e
>>>>>>>
>>>>>>> Substitute using the pad, get the encrypted message: Her
>>>>>>
>>>>>> Well, one uses a substitution table, trigraph, etc. and then
>>>>>> a pad to encrypt the message. Otherwise it would be a plain
>>>>>> text encoded message, right?
>>>>>
>>>>> Give me a OPT 3 bytes long. Creating a plaintext that results in a
>>>>> ciphertext of say 123, or ABC is possible...
>>>>
>>>> Yes, but then it is not OTP encryption and only plain code, done
>>>> with substitution, I would say. The OP's Subject: is Patterns.
>>>
>>> To be more clear, an OTP encrypted message with digits or letters
>>> can of course include 3-5 letter words or a 3-5 digits sequence, but
>>> in case of OTPs this means nothing and I would not call it pattern,
>>> in an encrypted message.
>>>
>>
>> AFAICT, it all boils down to fun with OTP's... ;^)
>>
>
> A One Time Pad means what it says. It can only be used once. It must be
> the same size as the message to be encrypted (ie you cannot use pad from
> earlier in the message to encode later stuff.) Otherwise it is weak. It
> is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other
> occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
> which is woefully weak. A OTP is unconditionally secret. It cannot be
> broken. An MTP is very weak, or a substitiution cypher is very weak
> unless the substition block is really large.
> OTPs are not fun. They are boring, because there is no way they can be
> broken, unless you capture the key. But of course that is their problem
> since you have to get the key to the recipient, without the enemy
> capturing the key, and the key is huge, so hard to hide.
>

There can be some fun. Then it makes one, at least me, think about
prepending plaintext with TRNG data and whacking it with HMAC... ;^)

Re: Patterns

<ur34f6$2mh1p$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=175&group=sci.crypt#175

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.samoylyk.net!newsfeed.xs3.de!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 13:09:57 -0800
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <ur34f6$2mh1p$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 20 Feb 2024 21:09:58 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="179eda77360736dadd068492fcb3f96b";
logging-data="2835513"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX189FhXDO4SKRAghx8K5vvwSGmQ/iKgq0BU="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:iMwCLdQeLNlvTJL5nAguVpqD1aE=
Content-Language: en-US
In-Reply-To: <uqln3h$2pbms$1@i2pn2.org>
 by: Chris M. Thomasson - Tue, 20 Feb 2024 21:09 UTC

On 2/15/2024 11:02 AM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>
>> On 2/13/2024 8:45 PM, Rich wrote:
>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>> wrote:
>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>> Deos anyone how what encryption is being used here?
>>>>>
>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>
>>>> None? lol. just kidding. Humm...
>>>>
>>>> Some combination of plaintext, secret key and cipher algorithm
>>>> generated it. Probably, the plaintext was hand crafted? ;^)
>>>
>>> As Jacob correctly pointed out, if one knows the message, one can
>>> then 'hand craft' a one-time-pad to generate exactly this output
>>> from that message.
>>
>> Or even the other way around? If one knows the OTP (Bob and/or
>> Alice), they can create a special plaintext that generates this
>> output for fun.
>
> How would you do this? I mean the OP IMHO does not show an encrypted
> string, done with an OTP. OTPs nature is that it does not include
> patterns and is totally random.

If Bob and Alice have access to the same OPT, one of them can create a
special plaintext that can give the message in the ciphertext, or
whatever... Think about it... ;^)

>
> Even if this string is not encrypted and only encoded, how would one
> get such pattern from plain text and convert it back to plain text?
>
> It had been best if the OP had posted a reference URL ...
>
> Regards
> Stefan

Re: Patterns

<ur3899$2nciu$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=176&group=sci.crypt#176

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!usenet.network!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 14:15:05 -0800
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <ur3899$2nciu$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur374g$2n32c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 20 Feb 2024 22:15:05 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="179eda77360736dadd068492fcb3f96b";
logging-data="2863710"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19AKCwqYIcypPxe2bkmkjJT5chgc11z2jE="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:cnwfBlHxgqnkrDBVD1qwkuOspgE=
Content-Language: en-US
In-Reply-To: <ur374g$2n32c$1@dont-email.me>
 by: Chris M. Thomasson - Tue, 20 Feb 2024 22:15 UTC

On 2/20/2024 1:55 PM, Richard Harnden wrote:
> On 20/02/2024 21:09, Chris M. Thomasson wrote:
>> On 2/15/2024 11:02 AM, Stefan Claas wrote:
>>> Chris M. Thomasson wrote:
>>>
>>>> On 2/13/2024 8:45 PM, Rich wrote:
>>>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>>>> wrote:
>>>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>>>> Deos anyone how what encryption is being used here?
>>>>>>>
>>>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>>>
>>>>>> None? lol. just kidding. Humm...
>>>>>>
>>>>>> Some combination of plaintext, secret key and cipher algorithm
>>>>>> generated it.  Probably, the plaintext was hand crafted?  ;^)
>>>>>
>>>>> As Jacob correctly pointed out, if one knows the message, one can
>>>>> then 'hand craft' a one-time-pad to generate exactly this output
>>>>> from that message.
>>>>
>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>> Alice), they can create a special plaintext that generates this
>>>> output for fun.
>>>
>>> How would you do this? I mean the OP IMHO does not show an encrypted
>>> string, done with an OTP. OTPs nature is that it does not include
>>> patterns and is totally random.
>>
>> If Bob and Alice have access to the same OPT, one of them can create a
>> special plaintext that can give the message in the ciphertext, or
>> whatever... Think about it... ;^)
>>
>
> If the ciphertext is just going to be 123...abc..., then there is no
> point in transmitting it.
>
>
>

Thing of using sections of a large OPT to get:

ciphertext: 123456789

plaintext: thefoxrun

Of source, alice is in on the fun. She says 123456789, lol...

Just for different ways of thinking how to use things.

Re: Patterns

<ur38ek$2ncis$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=177&group=sci.crypt#177

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 14:17:55 -0800
Organization: A noiseless patient Spider
Lines: 54
Message-ID: <ur38ek$2ncis$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur374g$2n32c$1@dont-email.me> <ur3899$2nciu$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 20 Feb 2024 22:17:56 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="179eda77360736dadd068492fcb3f96b";
logging-data="2863708"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+/Vru6qNwsaeO2gNy9zBRQUbzC5iePQgw="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:mIym+31goc8zTUIwLeCfFjt3qfo=
Content-Language: en-US
In-Reply-To: <ur3899$2nciu$1@dont-email.me>
 by: Chris M. Thomasson - Tue, 20 Feb 2024 22:17 UTC

On 2/20/2024 2:15 PM, Chris M. Thomasson wrote:
> On 2/20/2024 1:55 PM, Richard Harnden wrote:
>> On 20/02/2024 21:09, Chris M. Thomasson wrote:
>>> On 2/15/2024 11:02 AM, Stefan Claas wrote:
>>>> Chris M. Thomasson wrote:
>>>>
>>>>> On 2/13/2024 8:45 PM, Rich wrote:
>>>>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>>>>> wrote:
>>>>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>>>>> Deos anyone how what encryption is being used here?
>>>>>>>>
>>>>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>>>>
>>>>>>> None? lol. just kidding. Humm...
>>>>>>>
>>>>>>> Some combination of plaintext, secret key and cipher algorithm
>>>>>>> generated it.  Probably, the plaintext was hand crafted?  ;^)
>>>>>>
>>>>>> As Jacob correctly pointed out, if one knows the message, one can
>>>>>> then 'hand craft' a one-time-pad to generate exactly this output
>>>>>> from that message.
>>>>>
>>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>>> Alice), they can create a special plaintext that generates this
>>>>> output for fun.
>>>>
>>>> How would you do this? I mean the OP IMHO does not show an encrypted
>>>> string, done with an OTP. OTPs nature is that it does not include
>>>> patterns and is totally random.
>>>
>>> If Bob and Alice have access to the same OPT, one of them can create
>>> a special plaintext that can give the message in the ciphertext, or
>>> whatever... Think about it... ;^)
>>>
>>
>> If the ciphertext is just going to be 123...abc..., then there is no
>> point in transmitting it.
>>
>>
>>
>
> Thing of using sections of a large OPT to get:
>
> ciphertext: 123456789
>
> plaintext: thefoxrun
>
> Of source, alice is in on the fun. She says 123456789, lol...
>
> Just for different ways of thinking how to use things.

One can encrypt a message in binary while eating soup. The spoons and
the number of times it uses the spoon can encrypt. ;^)

Re: Patterns

<ur5f4g$3emdb$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=178&group=sci.crypt#178

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Wed, 21 Feb 2024 19:24:16 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <ur5f4g$3emdb$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 21 Feb 2024 18:24:16 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3627435"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
 by: Stefan Claas - Wed, 21 Feb 2024 18:24 UTC

Chris M. Thomasson wrote:

> If Bob and Alice have access to the same OPT, one of them can create
> a special plaintext that can give the message in the ciphertext, or
> whatever... Think about it... ;^)

Can you craft an example, maybe with code (that compiles ...)?

BTW. I would appreciate if you and other sci.crypt regulars
can sign my guestbook, on my Gemini-Capsule.

gemini://tilde.club/~pollux/

The guestbook is under Gästebuch.

I am thinking about to set-up a cryptobook for us in Geminispace,
so that small encrypted messages can be left there ... ;-)

Regards
Stefan
--
----Ed25519 Signature----
d9ebda51717e5bf7c606c460e632d40daa4fa4315574e6aa5b030d60a79654d0
6fa37e28bed2cc9d8ec7ba5d51dd97faa279d0ccc208092802bedc262e88bc0e

Re: Patterns

<ur8oet$5971$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=179&group=sci.crypt#179

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 22 Feb 2024 16:21:49 -0800
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <ur8oet$5971$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 23 Feb 2024 00:21:49 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="59f8a5d379a676625decc575bcbd250b";
logging-data="173281"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/aWf7UQu6D4rERVx9VuGnCnqEOrLX4XBI="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:sWW6MH/LsiG9DGj76zhQ264Tz7Y=
In-Reply-To: <ur5f4g$3emdb$1@i2pn2.org>
Content-Language: en-US
 by: Chris M. Thomasson - Fri, 23 Feb 2024 00:21 UTC

On 2/21/2024 10:24 AM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>
>> If Bob and Alice have access to the same OPT, one of them can create
>> a special plaintext that can give the message in the ciphertext, or
>> whatever... Think about it... ;^)
>
> Can you craft an example, maybe with code (that compiles ...)?
>
> BTW. I would appreciate if you and other sci.crypt regulars
> can sign my guestbook, on my Gemini-Capsule.
>
> gemini://tilde.club/~pollux/
>
> The guestbook is under Gästebuch.
>
> I am thinking about to set-up a cryptobook for us in Geminispace,
> so that small encrypted messages can be left there ... ;-)

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=9c113c0799ac3d9b52edbf3429aa673022d46643c5689d93f7cc16688e99961c249bb349a7c6a1c9603ddc793f613cb08a32d3c8284f6dd1a0e9fe3d2cbaf4b32d9717a7be19a1b4934a1e5c5b653ce9213e2acf0cd24a9af41789f9c0bba9fbe2f835a31fe35d90b95514f4d3ad1261e8fc3de2268fec68037bce2dc315ed0668cfd03c78335c171123bc164cca83816da4

Re: Patterns

<ura8d0$3lbfh$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=180&group=sci.crypt#180

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 23 Feb 2024 15:00:00 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <ura8d0$3lbfh$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur8oet$5971$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 23 Feb 2024 14:00:00 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3845617"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
 by: Stefan Claas - Fri, 23 Feb 2024 14:00 UTC

Chris M. Thomasson wrote:

> On 2/21/2024 10:24 AM, Stefan Claas wrote:
> > Chris M. Thomasson wrote:
> >
> >> If Bob and Alice have access to the same OPT, one of them can
> >> create a special plaintext that can give the message in the
> >> ciphertext, or whatever... Think about it... ;^)
> >
> > Can you craft an example, maybe with code (that compiles ...)?
> >
> > BTW. I would appreciate if you and other sci.crypt regulars
> > can sign my guestbook, on my Gemini-Capsule.
> >
> > gemini://tilde.club/~pollux/
> >
> > The guestbook is under Gästebuch.
> >
> > I am thinking about to set-up a cryptobook for us in Geminispace,
> > so that small encrypted messages can be left there ... ;-)
>
>
> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=9c113c0799ac3d9b52edbf3429aa673022d46643c5689d93f7cc16688e99961c249bb349a7c6a1c9603ddc793f613cb08a32d3c8284f6dd1a0e9fe3d2cbaf4b32d9717a7be19a1b4934a1e5c5b653ce9213e2acf0cd24a9af41789f9c0bba9fbe2f835a31fe35d90b95514f4d3ad1261e8fc3de2268fec68037bce2dc315ed0668cfd03c78335c171123bc164cca83816da4

Gemini is an Internet Protocol, starting with gemini:// and a mixture
of gopher and classic html.

Regards
Stefan
--
----Ed25519 Signature----
a3ea8d7848721a39804504886a973579eba929486734109e6a345b7d187c405b
4e2d0b5662ed90305670277288fce36151675d3789e48c9e334141e2613ab103

Re: Patterns

<urap03$3m0qb$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=181&group=sci.crypt#181

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Fri, 23 Feb 2024 19:43:15 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urap03$3m0qb$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur998d$c6fi$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 23 Feb 2024 18:43:15 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3867467"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Fri, 23 Feb 2024 18:43 UTC

Rich wrote:

> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> > Chris M. Thomasson wrote:
> >
> >> If Bob and Alice have access to the same OPT, one of them can
> >> create a special plaintext that can give the message in the
> >> ciphertext, or whatever... Think about it... ;^)
> >
> > Can you craft an example, maybe with code (that compiles ...)?
>
> This is not go, but you should be able to follow along well enough.
> Note that ^ is Tcl's expr's byte wise XOR operator.:
>
> #!/usr/bin/tclsh
>
> # "OTP" - obtained by running this, then converted to 0x notation
> by hand: # dd if=/dev/urandom bs=1 count=2 | xxd
> # f1c3
>
> set otp 0xf1c3
>
> # show otp:
> puts [format "OTP: %04x" $otp]
>
> # message that Bob should see in the encrypted text
> # "feed"
>
> set bob 0xfeed
>
> # create Alice's message, which when 'encrypted' will result in
> Bob seeing # "feed" in the encrypted text
>
> set alice [expr {$otp ^ $bob}]
>
> # output Alice's message as a hex string:
> puts [format "Alice 'special' message: %04x" $alice]
>
> # encrypt Alice's special message using the OTP:
>
> set ciphertext [expr {$alice ^ $otp}]
>
> # output ciphertext as hex string
> puts [format "Ciphertext: %04x" $ciphertext]

Thanks for the code example.
> Running this results in:
>
> OTP: f1c3
> Alice 'special' message: 0f2e
> Ciphertext: feed

He he, so Alice crafts a message she can't read herself, but the
ciphertext is readable for third parties. It would be cool if there
would be a real world usage scenario for this.

Maybe a verifying scheme, like Alice submits a long hex key to Bob,
in that form, so that he knows the message comes from Alice if it
says 'the quick brown fox jumps ...'

Regards
Stefan
--
----Ed25519 Signature----
0c8a7d5aead639537cab202da5fab93756cc33bd29705ca6edc240c9172d1a0e
e8dfca6350ec5e2963d906042c7667824673753acba4b7495a909b54bc1b6809

Re: Patterns

<urapui$3m68i$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=182&group=sci.crypt#182

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 23 Feb 2024 19:59:30 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urapui$3m68i$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur8oet$5971$1@dont-email.me>
<ura8d0$3lbfh$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 23 Feb 2024 18:59:30 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3873042"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Fri, 23 Feb 2024 18:59 UTC

Stefan Claas wrote:

> Gemini is an Internet Protocol, starting with gemini:// and a mixture
> of gopher and classic html.

https://github.com/kr1sp1n/awesome-gemini

Regards
Stefan
--
----Ed25519 Signature----
0d1bafdd4013b840a05c4a6b7218a01ce97f7e6faa213f917ae861a12af38d8c
1f1d33e84cc5547aa35c164ac810872324c8ebe738d8df9f00d301a332ae0e07

Re: Patterns

<urausi$nr02$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=183&group=sci.crypt#183

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 23 Feb 2024 12:23:47 -0800
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <urausi$nr02$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org> <ur8oet$5971$1@dont-email.me>
<ura8d0$3lbfh$1@i2pn2.org> <urapui$3m68i$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 23 Feb 2024 20:23:47 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="59f8a5d379a676625decc575bcbd250b";
logging-data="781314"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/7ABRAQnB+/7oYlhzusx7XhPBMF+ShIlw="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:N3N/F18VET+BRtAQKD9D80JQJpw=
In-Reply-To: <urapui$3m68i$1@i2pn2.org>
Content-Language: en-US
 by: Chris M. Thomasson - Fri, 23 Feb 2024 20:23 UTC

On 2/23/2024 10:59 AM, Stefan Claas wrote:
> Stefan Claas wrote:
>
>> Gemini is an Internet Protocol, starting with gemini:// and a mixture
>> of gopher and classic html.
>
> https://github.com/kr1sp1n/awesome-gemini

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=19d672f834593b161ffb1338f77bd51aa5328ab1854b531f33d415ac79ddb154a85beacb0a155cb64b47e551cadf2ad22ad689920bcdc670d1283d337413b691cd1294db0a7ae44bf6e5a9aa3adc138d4a7e2807c48c6612b1674b3caba2257776bfad003601cc973d6d95e2bab113cd7f70be4e8309c8a34a8c2aab53d511576093be2f566d67552c85812070ded60528b863f414a1e15a768302fe0bfabd28ed46d6593f32f33a0c1c4168dea84e722251a6f231979e93c1ba7c30

A little busy right now.

Re: Patterns

<urb1v1$3mbkh$2@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=184&group=sci.crypt#184

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Fri, 23 Feb 2024 22:16:17 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urb1v1$3mbkh$2@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur998d$c6fi$1@dont-email.me>
<urap03$3m0qb$1@i2pn2.org>
<urathn$ncq7$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 23 Feb 2024 21:16:17 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3878545"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
 by: Stefan Claas - Fri, 23 Feb 2024 21:16 UTC

Rich wrote:

> Stefan Claas <pollux@tilde.club> wrote:
> > Thanks for the code example.
> >
> >> Running this results in:
> >>
> >> OTP: f1c3
> >> Alice 'special' message: 0f2e
> >> Ciphertext: feed
> >
> > He he, so Alice crafts a message she can't read herself,
>
> Yes, doing anything like this to "craft" any one of the three pieces
> means one of the other pieces is going to look like gibberish.
>
> > but the ciphertext is readable for third parties. It would be cool
> > if there would be a real world usage scenario for this.
>
> Say you receive a purported encrypted message that reads thusly
> (assuming ASCII bytes):
>
> *1234567890ABCDEF01234567890ABCDEF0123456
>
> And you would like to "decrypt" it to read:
>
> The quick brown fox jumped over the lazy
>
> Why you might want to do this I can't say, perhaps to fool someone
> else who isn't very cryptographicly aware?

Yes, so that 3rd parties do not see that this is an encrypted message,
kind of steganography.
> So you just create an OTP pad as the bytewise XOR of each byte of the
> purported ciphertext with each byte of the desired decrypted text.
> I.e., you do:
>
> otp[i] = cipher[i] ^ desired_message[i] for i from 0 ...
> length(cipher)
>
> Then, you go to your not so knowledgable friend, indicating that you
> just received this message, and when you decrypt with "the pad" (not
> mentioning you fashioned "the pad" yourself) the message about the
> fox pops out.
>
> > Maybe a verifying scheme, like Alice submits a long hex key to Bob,
> > in that form, so that he knows the message comes from Alice if it
> > says 'the quick brown fox jumps ...'
>
> Not really a very safe way to 'verify' in that once someone
> learns/deduces the method, they can repeat with ease (i.e., the
> algorithm here has to be kept secret). At least a HMAC, provided
> Alice and Bob do in fact keep their shared key secret, is much harder
> to fake, even when Eve knows all about the algorithm.

Yes, understand, but if such a message would be posted anonymously,
probably only the receiver(s) know whats all about it.

Regards
Stefan
--
----Ed25519 Signature----
6a0eaa08046bba8dc871aa0b8efdc88737ae9e8687d310cb79e5f0329ae52b40
acd37e2d21cbfb7ca41095488a261f0c68031a0dea86e2c698a3f70c51581701

Re: Patterns

<urd6du$19m30$1@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=185&group=sci.crypt#185

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: droleary@2017usenet1.subsume.com (Doc O'Leary ,)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Sat, 24 Feb 2024 16:44:46 -0000 (UTC)
Organization: Subsume Technologies, Inc.
Lines: 32
Message-ID: <urd6du$19m30$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me> <uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me> <uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me> <ur5f4g$3emdb$1@i2pn2.org> <ur998d$c6fi$1@dont-email.me> <urap03$3m0qb$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 24 Feb 2024 16:44:46 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="84c6c92943dc8651c666fb34f856e5af";
logging-data="1366112"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19a7Ao2RLdNCirknTSxIfsmXqzHph5ATJY="
User-Agent: com.subsume.NNTP/1.0.0
Cancel-Lock: sha1:nreRaCaJSp5fPd64nGKFWXjhZ+U=
 by: Doc O'Leary , - Sat, 24 Feb 2024 16:44 UTC

For your reference, records indicate that
Stefan Claas <pollux@tilde.club> wrote:

> He he, so Alice crafts a message she can't read herself, but the
> ciphertext is readable for third parties. It would be cool if there
> would be a real world usage scenario for this.

There are probably plenty. One obvious use is simply transforming one OTP
to another OTP, for whatever reason it might make sense to “refresh” or
“resync" the parties holding the OTP.

As an example, you can create a kind of dead man’s switch if you not only
exchange an OTP with someone, but also agree to XOR it with some commonly
available innocuous “message”, like a news story/video/podcast, or a nightly
build of some open source software, or pretty much any shared-but-non-secret
info. Access to the OTP alone does not then compromise all the secrets.

Another use might be to just flat out *lie* about the data format your
encrypted message is:

<https://en.wikipedia.org/wiki/Magic_number_(programming)#In_files>

I mean, yeah, you can certainly try hide the message in another *valid*
file format, but you can spice things up for the attacker by forcing them
to consider if the JPEG they have intercepted is corrupted, or was ever
even a JPEG at all! :-)

--
"Also . . . I can kill you with my brain."
River Tam, Trash, Firefly

Re: Patterns

<urdenk$3pnnq$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=186&group=sci.crypt#186

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Sat, 24 Feb 2024 20:06:27 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urdenk$3pnnq$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur998d$c6fi$1@dont-email.me>
<urap03$3m0qb$1@i2pn2.org>
<urd6du$19m30$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 24 Feb 2024 19:06:28 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3989242"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Sat, 24 Feb 2024 19:06 UTC

Doc O'Leary , wrote:

> For your reference, records indicate that
> Stefan Claas <pollux@tilde.club> wrote:
>
> > He he, so Alice crafts a message she can't read herself, but the
> > ciphertext is readable for third parties. It would be cool if there
> > would be a real world usage scenario for this.
>
> There are probably plenty. One obvious use is simply transforming
> one OTP to another OTP, for whatever reason it might make sense to
> “refresh” or “resync" the parties holding the OTP.
>
> As an example, you can create a kind of dead man’s switch if you not
> only exchange an OTP with someone, but also agree to XOR it with some
> commonly available innocuous “message”, like a news
> story/video/podcast, or a nightly build of some open source software,
> or pretty much any shared-but-non-secret info. Access to the OTP
> alone does not then compromise all the secrets.
>
> Another use might be to just flat out *lie* about the data format
> your encrypted message is:
>
> <https://en.wikipedia.org/wiki/Magic_number_(programming)#In_files>
>
> I mean, yeah, you can certainly try hide the message in another
> *valid* file format, but you can spice things up for the attacker by
> forcing them to consider if the JPEG they have intercepted is
> corrupted, or was ever even a JPEG at all! :-)

Thanks for the explanation, much appreciated! :-)

Regards
Stefan
--
----Ed25519 Signature----
5d8b1bcd6084543a05426e256fbaa12e44e570cd152fd6c8f61c26bb06519ed9
ea0107239bf7465654726af7f3158651d3bfeb1056d0ca709e48af8a4d279d0d

Re: Patterns

<urdfs8$3ppfu$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=187&group=sci.crypt#187

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Sat, 24 Feb 2024 20:25:59 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urdfs8$3ppfu$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur8oet$5971$1@dont-email.me>
<ura8d0$3lbfh$1@i2pn2.org>
<urapui$3m68i$1@i2pn2.org>
<urausi$nr02$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 24 Feb 2024 19:26:00 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3991038"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Sat, 24 Feb 2024 19:25 UTC

Chris M. Thomasson wrote:

> On 2/23/2024 10:59 AM, Stefan Claas wrote:
> > Stefan Claas wrote:
> >
> >> Gemini is an Internet Protocol, starting with gemini:// and a
> >> mixture of gopher and classic html.
> >
> > https://github.com/kr1sp1n/awesome-gemini
>
> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=19d672f834593b161ffb1338f77bd51aa5328ab1854b531f33d415ac79ddb154a85beacb0a155cb64b47e551cadf2ad22ad689920bcdc670d1283d337413b691cd1294db0a7ae44bf6e5a9aa3adc138d4a7e2807c48c6612b1674b3caba2257776bfad003601cc973d6d95e2bab113cd7f70be4e8309c8a34a8c2aab53d511576093be2f566d67552c85812070ded60528b863f414a1e15a768302fe0bfabd28ed46d6593f32f33a0c1c4168dea84e722251a6f231979e93c1ba7c30
>
> A little busy right now.
>

No Problem! Don't forget to sign my guestbook (Gästebuch),
when exploring Geminispace. ;-)

Regards
Stefan
--
----Ed25519 Signature----
2f610593c193e717c188b9cc56c8d99a724227c8f67107f41c1714bb54e9e7fc
60c9bb65e4c1ade36179980d8a4d560ea18e358af033d56f54d0fbcedb658f06

Re: Patterns

<urdktv$1cis4$2@dont-email.me>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=188&group=sci.crypt#188

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Sat, 24 Feb 2024 12:52:16 -0800
Organization: A noiseless patient Spider
Lines: 69
Message-ID: <urdktv$1cis4$2@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org> <ur998d$c6fi$1@dont-email.me>
<urap03$3m0qb$1@i2pn2.org> <urathn$ncq7$1@dont-email.me>
<urb1v1$3mbkh$2@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 24 Feb 2024 20:52:16 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="7a5e0a725b528e2337414270c82c765a";
logging-data="1461124"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18URRppo+zIiSN46qfN0s5Pvlg2XKauGcw="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:x5oZOVQzBYJ3wtK3IIceLqZ4mc0=
Content-Language: en-US
In-Reply-To: <urb1v1$3mbkh$2@i2pn2.org>
 by: Chris M. Thomasson - Sat, 24 Feb 2024 20:52 UTC

On 2/23/2024 1:16 PM, Stefan Claas wrote:
> Rich wrote:
>
>> Stefan Claas <pollux@tilde.club> wrote:
>>> Thanks for the code example.
>>>
>>>> Running this results in:
>>>>
>>>> OTP: f1c3
>>>> Alice 'special' message: 0f2e
>>>> Ciphertext: feed
>>>
>>> He he, so Alice crafts a message she can't read herself,
>>
>> Yes, doing anything like this to "craft" any one of the three pieces
>> means one of the other pieces is going to look like gibberish.
>>
>>> but the ciphertext is readable for third parties. It would be cool
>>> if there would be a real world usage scenario for this.
>>
>> Say you receive a purported encrypted message that reads thusly
>> (assuming ASCII bytes):
>>
>> *1234567890ABCDEF01234567890ABCDEF0123456
>>
>> And you would like to "decrypt" it to read:
>>
>> The quick brown fox jumped over the lazy
>>
>> Why you might want to do this I can't say, perhaps to fool someone
>> else who isn't very cryptographicly aware?
>
> Yes, so that 3rd parties do not see that this is an encrypted message,
> kind of steganography.
>
>> So you just create an OTP pad as the bytewise XOR of each byte of the
>> purported ciphertext with each byte of the desired decrypted text.
>> I.e., you do:
>>
>> otp[i] = cipher[i] ^ desired_message[i] for i from 0 ...
>> length(cipher)
>>
>> Then, you go to your not so knowledgable friend, indicating that you
>> just received this message, and when you decrypt with "the pad" (not
>> mentioning you fashioned "the pad" yourself) the message about the
>> fox pops out.
>>
>>> Maybe a verifying scheme, like Alice submits a long hex key to Bob,
>>> in that form, so that he knows the message comes from Alice if it
>>> says 'the quick brown fox jumps ...'
>>
>> Not really a very safe way to 'verify' in that once someone
>> learns/deduces the method, they can repeat with ease (i.e., the
>> algorithm here has to be kept secret). At least a HMAC, provided
>> Alice and Bob do in fact keep their shared key secret, is much harder
>> to fake, even when Eve knows all about the algorithm.
>
> Yes, understand, but if such a message would be posted anonymously,
> probably only the receiver(s) know whats all about it.

Bob: "The dog was walking itself when the sun was down yesterday." in a
public forum.

Alice reads that and just "knows" to meet Bob in a _specific_ park where
there are dogs off their leashes when the sun is up in 42 days from now...

Something like that? Never mind that Alice is under surveillance...

;^)

Re: Patterns

<urfqp5$3sm9i$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=189&group=sci.crypt#189

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Sun, 25 Feb 2024 17:44:19 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urfqp5$3sm9i$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur998d$c6fi$1@dont-email.me>
<urap03$3m0qb$1@i2pn2.org>
<urathn$ncq7$1@dont-email.me>
<urb1v1$3mbkh$2@i2pn2.org>
<urdktv$1cis4$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 25 Feb 2024 16:44:21 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="4086066"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
 by: Stefan Claas - Sun, 25 Feb 2024 16:44 UTC

Chris M. Thomasson wrote:

> On 2/23/2024 1:16 PM, Stefan Claas wrote:
> > Rich wrote:
> >
> >> Stefan Claas <pollux@tilde.club> wrote:
> >>> Thanks for the code example.
> >>>
> >>>> Running this results in:
> >>>>
> >>>> OTP: f1c3
> >>>> Alice 'special' message: 0f2e
> >>>> Ciphertext: feed
> >>>
> >>> He he, so Alice crafts a message she can't read herself,
> >>
> >> Yes, doing anything like this to "craft" any one of the three
> >> pieces means one of the other pieces is going to look like
> >> gibberish.
> >>
> >>> but the ciphertext is readable for third parties. It would be
> >>> cool if there would be a real world usage scenario for this.
> >>
> >> Say you receive a purported encrypted message that reads thusly
> >> (assuming ASCII bytes):
> >>
> >> *1234567890ABCDEF01234567890ABCDEF0123456
> >>
> >> And you would like to "decrypt" it to read:
> >>
> >> The quick brown fox jumped over the lazy
> >>
> >> Why you might want to do this I can't say, perhaps to fool someone
> >> else who isn't very cryptographicly aware?
> >
> > Yes, so that 3rd parties do not see that this is an encrypted
> > message, kind of steganography.
> >
> >> So you just create an OTP pad as the bytewise XOR of each byte of
> >> the purported ciphertext with each byte of the desired decrypted
> >> text. I.e., you do:
> >>
> >> otp[i] = cipher[i] ^ desired_message[i] for i from 0 ...
> >> length(cipher)
> >>
> >> Then, you go to your not so knowledgable friend, indicating that
> >> you just received this message, and when you decrypt with "the
> >> pad" (not mentioning you fashioned "the pad" yourself) the message
> >> about the fox pops out.
> >>
> >>> Maybe a verifying scheme, like Alice submits a long hex key to
> >>> Bob, in that form, so that he knows the message comes from Alice
> >>> if it says 'the quick brown fox jumps ...'
> >>
> >> Not really a very safe way to 'verify' in that once someone
> >> learns/deduces the method, they can repeat with ease (i.e., the
> >> algorithm here has to be kept secret). At least a HMAC, provided
> >> Alice and Bob do in fact keep their shared key secret, is much
> >> harder to fake, even when Eve knows all about the algorithm.
> >
> > Yes, understand, but if such a message would be posted anonymously,
> > probably only the receiver(s) know whats all about it.
>
> Bob: "The dog was walking itself when the sun was down yesterday." in
> a public forum.
>
> Alice reads that and just "knows" to meet Bob in a _specific_ park
> where there are dogs off their leashes when the sun is up in 42 days
> from now...
>
> Something like that? Never mind that Alice is under surveillance...

Yes, that would be nice, if a software implementation for that exists.

One the other side, you can hide OTP messages in text, like this:

Create your OPT message, consisting of digits, like usual. Once done
create a harmless story, with a couple of sentences. The word count
of each sentence represents a digit in the OTP message.

Once Bob receives the story from Alice he simple counts the words in
each sentence and writes down the digits, so that he later can decrypt,
with the exchanged pads, the story.

You can let AI, like Bing, write the stories and tell it how many words
per sentence must be in the story. I did this once successfully. :-)

Regards
Stefan
--
----Ed25519 Signature----
3333210c0ee5a760d6f03d01d5717f1d273f6e479f6db89a69b12b9b8d8a6d7b
3c082fb637cef297ee3b2bcb664f24ce4dded79dc2f9c5419a31ce41c297130d

Re: Patterns

<urftja$3ssd6$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=191&group=sci.crypt#191

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Sun, 25 Feb 2024 18:32:25 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urftja$3ssd6$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur998d$c6fi$1@dont-email.me>
<urap03$3m0qb$1@i2pn2.org>
<urathn$ncq7$1@dont-email.me>
<urb1v1$3mbkh$2@i2pn2.org>
<urdktv$1cis4$2@dont-email.me>
<urfqp5$3sm9i$1@i2pn2.org>
<urfs51$1v6j3$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 25 Feb 2024 17:32:26 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="4092326"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Sun, 25 Feb 2024 17:32 UTC

Richard Harnden wrote:

> > Create your OPT message, consisting of digits, like usual. Once done
> > create a harmless story, with a couple of sentences. The word count
> > of each sentence represents a digit in the OTP message.
> >
> > Once Bob receives the story from Alice he simple counts the words in
> > each sentence and writes down the digits, so that he later can
> > decrypt, with the exchanged pads, the story.
> >
> > You can let AI, like Bing, write the stories and tell it how many
> > words per sentence must be in the story. I did this once
> > successfully. :-)
> >
>
> That isn't random, so isn't a OTP at all.

Excuse me, you create random pads as usual and the OTP messages as
usual, which is random and from the ciphertext digits you create with
the help of AI your story.

Regards
Stefan
--
----Ed25519 Signature----
1c4087b8b9c1a9574db57d25a7af79286ee494146cce2de510a325bc1fd4ce17
8d8d8d68442dc1ca5e6bb4c2861981293318092685fd6ff39b9a47214e22410d

Re: Patterns

<urfv5q$3sv9l$1@i2pn2.org>

  copy mid

https://news.octade.net/USENET/article-flat.php?id=192&group=sci.crypt#192

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Sun, 25 Feb 2024 18:59:20 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <urfv5q$3sv9l$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
<ur998d$c6fi$1@dont-email.me>
<urap03$3m0qb$1@i2pn2.org>
<urathn$ncq7$1@dont-email.me>
<urb1v1$3mbkh$2@i2pn2.org>
<urdktv$1cis4$2@dont-email.me>
<urfqp5$3sm9i$1@i2pn2.org>
<urfs51$1v6j3$2@dont-email.me>
<urftja$3ssd6$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 25 Feb 2024 17:59:22 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="4095285"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
 by: Stefan Claas - Sun, 25 Feb 2024 17:59 UTC

Stefan Claas wrote:

> Richard Harnden wrote:
>
> > > Create your OPT message, consisting of digits, like usual. Once
> > > done create a harmless story, with a couple of sentences. The
> > > word count of each sentence represents a digit in the OTP message.
> > >
> > > Once Bob receives the story from Alice he simple counts the words
> > > in each sentence and writes down the digits, so that he later can
> > > decrypt, with the exchanged pads, the story.
> > >
> > > You can let AI, like Bing, write the stories and tell it how many
> > > words per sentence must be in the story. I did this once
> > > successfully. :-)
> > >
> >
> > That isn't random, so isn't a OTP at all.
>
> Excuse me, you create random pads as usual and the OTP messages as
> usual, which is random and from the ciphertext digits you create with
> the help of AI your story.

<https://rijmenants.blogspot.com/2014/12/wps-secret-numbers-in-letters.html>

Regards
Stefan
--
----Ed25519 Signature----
dc19ac1817f25ebe02c54514b64d911a701c338e4b3bd618e47d37756ca73a31
3c6c761eb5b79ed2b00b11af5ab46ed4773cba010c572c069d5ff838d2578d0c


USENET / sci.crypt / Re: Patterns

Pages:12

rocksolid light 0.9.152
clearnet tor