![]() |
![]() |
#1 |
"Forget I exist"
Jul 2009
Dartmouth NS
23·3·5·71 Posts |
![]()
is this a good encryption method ?
Shift each character in the message by it's position. or should a good one be more complicated. |
![]() |
![]() |
![]() |
#2 |
"Vincent"
Apr 2010
Over the rainbow
292310 Posts |
![]()
far too simple, i would say
a good encryption method would require a 'key' as long as the message, and could be used only once. or another possibility is the double encryption, without key transmission A encode the message, then send it to B B apply his own encryption key to the message and send it back to A A decode the message with his key , then send to B then B just have to decode the message |
![]() |
![]() |
![]() |
#3 | |
"Forget I exist"
Jul 2009
Dartmouth NS
23·3·5·71 Posts |
![]() Quote:
unless you send the same basic message more than once each message could be it's own key if it has to be as long as the message, but anyway I'm making stuff I couldn't easily decrypt lol |
|
![]() |
![]() |
![]() |
#4 |
Bamboozled!
"๐บ๐๐ท๐ท๐ญ"
May 2003
Down not across
1092 Posts |
![]() |
![]() |
![]() |
![]() |
#5 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
2·47·73 Posts |
![]() Quote:
Anyhow all this stuff has been solved. Lots of good schemes exist for generating a shared secret key, but we still have the authentication problem. SSL is okay, not great though unless you absolutely trust all of those root key authorities in your browser. How come we have so many root authorities? Why TF is the Hong Kong Post Office in there? Do you trust them? |
|
![]() |
![]() |
![]() |
#6 | |
6809 > 6502
"""""""""""""""""""
Aug 2003
101ร103 Posts
3×47×79 Posts |
![]() Quote:
the = ujh them = ujhq they = ujhc method failure Layering a word position on top of that would help, a little. Alternately (every other word) shifting forward and backward would help, a little. |
|
![]() |
![]() |
![]() |
#7 | |
"Forget I exist"
Jul 2009
Dartmouth NS
205108 Posts |
![]() Quote:
the=ujh at position 1 the=vki at position 2 ...... at position x the problem i see is it's still almost as bad as using constant shift because regardless we would know to shift this this way by this much so it needs more random organisation but still able for decoding. |
|
![]() |
![]() |
![]() |
#8 | |
Bamboozled!
"๐บ๐๐ท๐ท๐ญ"
May 2003
Down not across
1092 Posts |
![]() Quote:
Paul |
|
![]() |
![]() |
![]() |
#9 | |
"Forget I exist"
Jul 2009
Dartmouth NS
23×3×5×71 Posts |
![]() Quote:
states and I quote: "In cryptography, a key is a piece of information " heres a piece of information: shift each the place value for each characters place. |
|
![]() |
![]() |
![]() |
#10 | |
Bamboozled!
"๐บ๐๐ท๐ท๐ญ"
May 2003
Down not across
2E6916 Posts |
![]() Quote:
Put simply, if you don't understand Kerckhoffs' Principles, you do not have a clue about what cryptography really means. Paul |
|
![]() |
![]() |
![]() |
#11 |
Aug 2006
598810 Posts |
![]()
Aside from the ban on 'security through obscurity', which of the Principles do you think are still relevant today? Telegraphy isn't important, and complex methods are now acceptable thanks to the advent of general-purpose computers.
|
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Good air-cooler good enough for overclocked i7-5820K | RienS | Hardware | 17 | 2014-11-18 22:58 |
Laymans explanation of RSA encryption | Fusion_power | Programming | 3 | 2013-11-04 20:50 |
Encryption and governments | retina | Soap Box | 119 | 2012-02-28 05:00 |
Good Plus k; what to do? | roger | Riesel Prime Search | 1 | 2007-07-10 06:50 |
Interesting Encryption problem | FDCmercs | Math | 0 | 2007-01-07 15:50 |