mersenneforum.org  

Go Back   mersenneforum.org > Extra Stuff > Soap Box

Reply
 
Thread Tools
Old 2010-10-14, 11:42   #1
science_man_88
 
science_man_88's Avatar
 
"Forget I exist"
Jul 2009
Dartmouth NS

23·3·5·71 Posts
Default A good encryption ?

is this a good encryption method ?

Shift each character in the message by it's position.

or should a good one be more complicated.
science_man_88 is offline   Reply With Quote
Old 2010-10-14, 12:06   #2
firejuggler
 
firejuggler's Avatar
 
"Vincent"
Apr 2010
Over the rainbow

292310 Posts
Default

far too simple, i would say
a good encryption method would require a 'key' as long as the message, and could be used only once.
or another possibility is the double encryption, without key transmission
A encode the message, then send it to B
B apply his own encryption key to the message and send it back to A
A decode the message with his key , then send to B
then B just have to decode the message
firejuggler is offline   Reply With Quote
Old 2010-10-14, 12:12   #3
science_man_88
 
science_man_88's Avatar
 
"Forget I exist"
Jul 2009
Dartmouth NS

23·3·5·71 Posts
Default

Quote:
Originally Posted by firejuggler View Post
far too simple, i would say
a good encryption method would require a 'key' as long as the message, and could be used only once.
or another possibility is the double encryption, without key transmission
A encode the message, then send it to B
B apply his own encryption key to the message and send it back to A
A decode the message with his key , then send to B
then B just have to decode the message

unless you send the same basic message more than once each message could be it's own key if it has to be as long as the message, but anyway I'm making stuff I couldn't easily decrypt lol
science_man_88 is offline   Reply With Quote
Old 2010-10-14, 12:25   #4
xilman
Bamboozled!
 
xilman's Avatar
 
"๐’‰บ๐’ŒŒ๐’‡ท๐’†ท๐’€ญ"
May 2003
Down not across

1092 Posts
Default

Quote:
Originally Posted by science_man_88 View Post
is this a good encryption method ?

Shift each character in the message by it's position.

or should a good one be more complicated.
It's a lousy encryption method.

Paul
xilman is offline   Reply With Quote
Old 2010-10-14, 13:12   #5
retina
Undefined
 
retina's Avatar
 
"The unspeakable one"
Jun 2006
My evil lair

2·47·73 Posts
Default

Quote:
Originally Posted by firejuggler View Post
or another possibility is the double encryption, without key transmission
A encode the message, then send it to B
B apply his own encryption key to the message and send it back to A
A decode the message with his key , then send to B
then B just have to decode the message
Technically that is not an encryption method, but is a transmission method. But you don't say how you verify who B is. Authentication is very important for that sort of scheme.

Anyhow all this stuff has been solved. Lots of good schemes exist for generating a shared secret key, but we still have the authentication problem. SSL is okay, not great though unless you absolutely trust all of those root key authorities in your browser. How come we have so many root authorities? Why TF is the Hong Kong Post Office in there? Do you trust them?
retina is offline   Reply With Quote
Old 2010-10-14, 13:19   #6
Uncwilly
6809 > 6502
 
Uncwilly's Avatar
 
"""""""""""""""""""
Aug 2003
101ร—103 Posts

3×47×79 Posts
Default

Quote:
Originally Posted by science_man_88 View Post
is this a good encryption method ?

Shift each character in the message by it's position.
As a first year high school BASIC programming assignment, yes it is good for that.

the = ujh
them = ujhq
they = ujhc

method failure

Layering a word position on top of that would help, a little.
Alternately (every other word) shifting forward and backward would help, a little.
Uncwilly is offline   Reply With Quote
Old 2010-10-14, 14:07   #7
science_man_88
 
science_man_88's Avatar
 
"Forget I exist"
Jul 2009
Dartmouth NS

205108 Posts
Default

Quote:
Originally Posted by Uncwilly View Post
As a first year high school BASIC programming assignment, yes it is good for that.

the = ujh
them = ujhq
they = ujhc

method failure

Layering a word position on top of that would help, a little.
Alternately (every other word) shifting forward and backward would help, a little.
at least you seem positive yeah that's why I thought of the shifting depending on position because then instead of the=ujh all the time it could be

the=ujh at position 1
the=vki at position 2
...... at position x

the problem i see is it's still almost as bad as using constant shift because regardless we would know to shift this this way by this much so it needs more random organisation but still able for decoding.
science_man_88 is offline   Reply With Quote
Old 2010-10-14, 14:17   #8
xilman
Bamboozled!
 
xilman's Avatar
 
"๐’‰บ๐’ŒŒ๐’‡ท๐’†ท๐’€ญ"
May 2003
Down not across

1092 Posts
Default

Quote:
Originally Posted by science_man_88 View Post
at least you seem positive yeah that's why I thought of the shifting depending on position because then instead of the=ujh all the time it could be

the=ujh at position 1
the=vki at position 2
...... at position x

the problem i see is it's still almost as bad as using constant shift because regardless we would know to shift this this way by this much so it needs more random organisation but still able for decoding.
You're still not seeing the obvious: this is not an encryption system because there is no key.

Paul
xilman is offline   Reply With Quote
Old 2010-10-14, 14:23   #9
science_man_88
 
science_man_88's Avatar
 
"Forget I exist"
Jul 2009
Dartmouth NS

23×3×5×71 Posts
Default

Quote:
Originally Posted by xilman View Post
You're still not seeing the obvious: this is not an encryption system because there is no key.

Paul
http://en.wikipedia.org/wiki/Key_(cryptography)
states and I quote:

"In cryptography, a key is a piece of information " heres a piece of information:

shift each the place value for each characters place.
science_man_88 is offline   Reply With Quote
Old 2010-10-14, 14:46   #10
xilman
Bamboozled!
 
xilman's Avatar
 
"๐’‰บ๐’ŒŒ๐’‡ท๐’†ท๐’€ญ"
May 2003
Down not across

2E6916 Posts
Default

Quote:
Originally Posted by science_man_88 View Post
http://en.wikipedia.org/wiki/Key_(cryptography)
states and I quote:

"In cryptography, a key is a piece of information " heres a piece of information:

shift each the place value for each characters place.
If you are going to start quoting definitions at me, I recommend that you first read La Cryptographie Militaire, by Auguste Kerckhoffs.

Put simply, if you don't understand Kerckhoffs' Principles, you do not have a clue about what cryptography really means.


Paul
xilman is offline   Reply With Quote
Old 2010-10-14, 15:40   #11
CRGreathouse
 
CRGreathouse's Avatar
 
Aug 2006

598810 Posts
Default

Quote:
Originally Posted by xilman View Post
Put simply, if you don't understand Kerckhoffs' Principles, you do not have a clue about what cryptography really means.
Aside from the ban on 'security through obscurity', which of the Principles do you think are still relevant today? Telegraphy isn't important, and complex methods are now acceptable thanks to the advent of general-purpose computers.
CRGreathouse is offline   Reply With Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
Good air-cooler good enough for overclocked i7-5820K RienS Hardware 17 2014-11-18 22:58
Laymans explanation of RSA encryption Fusion_power Programming 3 2013-11-04 20:50
Encryption and governments retina Soap Box 119 2012-02-28 05:00
Good Plus k; what to do? roger Riesel Prime Search 1 2007-07-10 06:50
Interesting Encryption problem FDCmercs Math 0 2007-01-07 15:50

All times are UTC. The time now is 03:23.


Sat Sep 30 03:23:37 UTC 2023 up 17 days, 1:05, 0 users, load averages: 1.88, 1.86, 1.60

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.

โ‰  ยฑ โˆ“ รท ร— ยท โˆ’ โˆš โ€ฐ โŠ— โŠ• โŠ– โŠ˜ โŠ™ โ‰ค โ‰ฅ โ‰ฆ โ‰ง โ‰จ โ‰ฉ โ‰บ โ‰ป โ‰ผ โ‰ฝ โŠ โА โŠ‘ โŠ’ ยฒ ยณ ยฐ
โˆ  โˆŸ ยฐ โ‰… ~ โ€– โŸ‚ โซ›
โ‰ก โ‰œ โ‰ˆ โˆ โˆž โ‰ช โ‰ซ โŒŠโŒ‹ โŒˆโŒ‰ โˆ˜ โˆ โˆ โˆ‘ โˆง โˆจ โˆฉ โˆช โจ€ โŠ• โŠ— ๐–• ๐–– ๐–— โŠฒ โŠณ
โˆ… โˆ– โˆ โ†ฆ โ†ฃ โˆฉ โˆช โІ โŠ‚ โŠ„ โŠŠ โЇ โŠƒ โŠ… โŠ‹ โŠ– โˆˆ โˆ‰ โˆ‹ โˆŒ โ„• โ„ค โ„š โ„ โ„‚ โ„ต โ„ถ โ„ท โ„ธ ๐“Ÿ
ยฌ โˆจ โˆง โŠ• โ†’ โ† โ‡’ โ‡ โ‡” โˆ€ โˆƒ โˆ„ โˆด โˆต โŠค โŠฅ โŠข โŠจ โซค โŠฃ โ€ฆ โ‹ฏ โ‹ฎ โ‹ฐ โ‹ฑ
โˆซ โˆฌ โˆญ โˆฎ โˆฏ โˆฐ โˆ‡ โˆ† ฮด โˆ‚ โ„ฑ โ„’ โ„“
๐›ข๐›ผ ๐›ฃ๐›ฝ ๐›ค๐›พ ๐›ฅ๐›ฟ ๐›ฆ๐œ€๐œ– ๐›ง๐œ ๐›จ๐œ‚ ๐›ฉ๐œƒ๐œ— ๐›ช๐œ„ ๐›ซ๐œ… ๐›ฌ๐œ† ๐›ญ๐œ‡ ๐›ฎ๐œˆ ๐›ฏ๐œ‰ ๐›ฐ๐œŠ ๐›ฑ๐œ‹ ๐›ฒ๐œŒ ๐›ด๐œŽ๐œ ๐›ต๐œ ๐›ถ๐œ ๐›ท๐œ™๐œ‘ ๐›ธ๐œ’ ๐›น๐œ“ ๐›บ๐œ”