• Patterns

    From The Doctor@21:1/5 to All on Tue Feb 13 01:30:32 2024
    XPost: sci.crypt

    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456
    --
    Member - Liberal International This is doctor@nk.ca Ici doctor@nk.ca
    Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising! Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen The ignorant won't rest until everyone is as dumb as they are. -unknown Beware https://mindspring.com

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jakob Bohm@21:1/5 to The Doctor on Tue Feb 13 16:44:22 2024
    XPost: sci.crypt

    On 2024-02-13 02:30, The Doctor wrote:
    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456


    Probably a one time pad customized to generating this particular
    "ciphertext" for a specific plaintext. Of cause, this can only
    be done by knowing the message before the key is chosen, thus
    making it equally easy to just share the plaintext over that key
    distribution channel .


    Enjoy

    Jakob
    --
    Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
    Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
    This public discussion message is non-binding and may contain errors.
    WiseMo - Remote Service Management for PCs, Phones and Embedded

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to Chris M. Thomasson on Wed Feb 14 04:45:54 2024
    XPost: sci.crypt

    In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
    On 2/12/2024 5:30 PM, The Doctor wrote:
    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456

    None? lol. just kidding. Humm...

    Some combination of plaintext, secret key and cipher algorithm
    generated it. Probably, the plaintext was hand crafted? ;^)

    As Jacob correctly pointed out, if one knows the message, one can then
    'hand craft' a one-time-pad to generate exactly this output from that
    message. The usual issues with getting the OTP to Bob so Bob can
    decrypt still apply.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Chris M. Thomasson on Thu Feb 15 20:02:08 2024
    XPost: sci.crypt

    Chris M. Thomasson wrote:

    On 2/13/2024 8:45 PM, Rich wrote:
    In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
    wrote:
    On 2/12/2024 5:30 PM, The Doctor wrote:
    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456

    None? lol. just kidding. Humm...

    Some combination of plaintext, secret key and cipher algorithm
    generated it. Probably, the plaintext was hand crafted? ;^)

    As Jacob correctly pointed out, if one knows the message, one can
    then 'hand craft' a one-time-pad to generate exactly this output
    from that message.

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this? I mean the OP IMHO does not show an encrypted
    string, done with an OTP. OTPs nature is that it does not include
    patterns and is totally random.

    Even if this string is not encrypted and only encoded, how would one
    get such pattern from plain text and convert it back to plain text?

    It had been best if the OP had posted a reference URL ...

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 924d68b09939ff530a360fb2865c20195c09f0c0278c1e189d9a2ec3d036d252 c1fb0947cde91b30f3a85319c063eb0d72fce5b739a2bd9ea09bc55bb65e4e01

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to Stefan Claas on Thu Feb 15 19:51:56 2024
    XPost: sci.crypt

    In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
    Chris M. Thomasson wrote:

    On 2/13/2024 8:45 PM, Rich wrote:
    In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
    wrote:
    On 2/12/2024 5:30 PM, The Doctor wrote:
    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456

    None? lol. just kidding. Humm...

    Some combination of plaintext, secret key and cipher algorithm
    generated it. Probably, the plaintext was hand crafted? ;^)

    As Jacob correctly pointed out, if one knows the message, one can
    then 'hand craft' a one-time-pad to generate exactly this output
    from that message.

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this?

    For a traditional, 1940's substution style OTP, it is trivial:

    Message: The

    Pad:

    T=H
    e=r
    h=e

    Substitute using the pad, get the encrypted message: Her

    One can do the same in reverse, if one has an encrypted message, one
    can "fashion" a "pad" that will appear to make the message decrypt to
    anything you like (so long as "anything" is the same length as the
    encrypted message). Note that for the above I picked that pad on
    purpose so that "The" would /encrypt/ to "Her".

    If one uses XOR to encrypt using their OTP then fashioning a "pad" to
    transform X into Y is simply byte wise X (xor) Y. The result is a pad
    that will transform X into Y (or Y into X) by XOR.

    I mean the OP IMHO does not show an encrypted string, done with an
    OTP.

    That's the magic of OTP's that provide their prefect secrecy, we can't
    know if that is an ecrypted string, decrypted string, or just random
    line noise. All possible "decryptions" are possible, and finding the
    one 'needle' in the haystack of "not the right pad this time" is
    troublesome. Less so in today's world where a computer can "spell
    check" the message and dismiss much of the hay in a near instant.

    OTPs nature is that it does not include patterns and is totally
    random.

    Properly secure OTP's, yes. But we can't know with certianty that OP's original string was not from a 'custom crafted OTP'.

    Even if this string is not encrypted and only encoded, how would one
    get such pattern from plain text and convert it back to plain text?

    By choosing the "encoding" in order to make such happen.

    It had been best if the OP had posted a reference URL ...

    I doubt OP found the string at some URL. I suspect the OP was
    trolling.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Rich on Thu Feb 15 21:20:03 2024
    XPost: sci.crypt

    Rich wrote:

    In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
    Chris M. Thomasson wrote:

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this?

    For a traditional, 1940's substution style OTP, it is trivial:

    Message: The

    Pad:

    T=H
    e=r
    h=e

    Substitute using the pad, get the encrypted message: Her

    Well, one uses a substitution table, trigraph, etc. and then
    a pad to encrypt the message. Otherwise it would be a plain
    text encoded message, right?

    It had been best if the OP had posted a reference URL ...

    I doubt OP found the string at some URL. I suspect the OP was
    trolling.

    That was my thought too and the reason why I did not reply to him
    directly.

    Regards
    Stefan
    --
    ----Ed25519 Signature---- cec364f80a628ea8fa2d4734e0cf804ad331b8d6f2e65c1f2f7441fc2728186c 2cc5ce7d3e5d69a80c0140c8973536ed840a5613f727eb5924612d392b7ea202

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Stefan Claas on Fri Feb 16 18:07:48 2024
    XPost: sci.crypt

    Stefan Claas wrote:

    Chris M. Thomasson wrote:

    On 2/15/2024 12:20 PM, Stefan Claas wrote:
    Rich wrote:

    In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
    Chris M. Thomasson wrote:

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this?

    For a traditional, 1940's substution style OTP, it is trivial:

    Message: The

    Pad:

    T=H
    e=r
    h=e

    Substitute using the pad, get the encrypted message: Her

    Well, one uses a substitution table, trigraph, etc. and then
    a pad to encrypt the message. Otherwise it would be a plain
    text encoded message, right?

    Give me a OPT 3 bytes long. Creating a plaintext that results in a ciphertext of say 123, or ABC is possible...

    Yes, but then it is not OTP encryption and only plain code, done
    with substitution, I would say. The OP's Subject: is Patterns.

    To be more clear, an OTP encrypted message with digits or letters
    can of course include 3-5 letter words or a 3-5 digits sequence, but
    in case of OTPs this means nothing and I would not call it pattern,
    in an encrypted message.

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 48c677c37bef1ad110bea0c0c42da8846f5b1e628b1b04d6f2400cc4696c5171 361fc85f7b1c3ebd65756278b51194f681428720b3b4360c13b7c3d306fd8d0f

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Chris M. Thomasson on Fri Feb 16 17:57:32 2024
    XPost: sci.crypt

    Chris M. Thomasson wrote:

    On 2/15/2024 12:20 PM, Stefan Claas wrote:
    Rich wrote:

    In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
    Chris M. Thomasson wrote:

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this?

    For a traditional, 1940's substution style OTP, it is trivial:

    Message: The

    Pad:

    T=H
    e=r
    h=e

    Substitute using the pad, get the encrypted message: Her

    Well, one uses a substitution table, trigraph, etc. and then
    a pad to encrypt the message. Otherwise it would be a plain
    text encoded message, right?

    Give me a OPT 3 bytes long. Creating a plaintext that results in a
    ciphertext of say 123, or ABC is possible...

    Yes, but then it is not OTP encryption and only plain code, done
    with substitution, I would say. The OP's Subject: is Patterns.

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 0722421a0b6680c4ade0fcaac8d76552cf746531dd89eeca1b7db32ecef8bceb 9c4ca60a0298d56bd96340d8a4a1b05bc4c38d6fcf13d8aa2633018b09f0ff0f

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From William Unruh@21:1/5 to Chris M. Thomasson on Sat Feb 17 00:25:30 2024
    XPost: sci.crypt

    On 2024-02-16, Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
    On 2/16/2024 9:07 AM, Stefan Claas wrote:
    Stefan Claas wrote:

    Chris M. Thomasson wrote:

    On 2/15/2024 12:20 PM, Stefan Claas wrote:
    Rich wrote:

    In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
    Chris M. Thomasson wrote:

    Or even the other way around? If one knows the OTP (Bob and/or >>>>>>>> Alice), they can create a special plaintext that generates this >>>>>>>> output for fun.

    How would you do this?

    For a traditional, 1940's substution style OTP, it is trivial:

    Message: The

    Pad:

    T=H
    e=r
    h=e

    Substitute using the pad, get the encrypted message: Her

    Well, one uses a substitution table, trigraph, etc. and then
    a pad to encrypt the message. Otherwise it would be a plain
    text encoded message, right?

    Give me a OPT 3 bytes long. Creating a plaintext that results in a
    ciphertext of say 123, or ABC is possible...

    Yes, but then it is not OTP encryption and only plain code, done
    with substitution, I would say. The OP's Subject: is Patterns.

    To be more clear, an OTP encrypted message with digits or letters
    can of course include 3-5 letter words or a 3-5 digits sequence, but
    in case of OTPs this means nothing and I would not call it pattern,
    in an encrypted message.


    AFAICT, it all boils down to fun with OTP's... ;^)


    A One Time Pad means what it says. It can only be used once. It must be
    the same size as the message to be encrypted (ie you cannot use pad from earlier in the message to encode later stuff.) Otherwise it is weak. It
    is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
    which is woefully weak. A OTP is unconditionally secret. It cannot be
    broken. An MTP is very weak, or a substitiution cypher is very weak
    unless the substition block is really large.
    OTPs are not fun. They are boring, because there is no way they can be
    broken, unless you capture the key. But of course that is their problem
    since you have to get the key to the recipient, without the enemy
    capturing the key, and the key is huge, so hard to hide.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to William Unruh on Sat Feb 17 05:39:02 2024
    XPost: sci.crypt

    In sci.crypt William Unruh <unruh@invalid.ca> wrote:
    A One Time Pad means what it says. It can only be used once. It must be
    the same size as the message to be encrypted (ie you cannot use pad from earlier in the message to encode later stuff.) Otherwise it is weak. It
    is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
    which is woefully weak. A OTP is unconditionally secret. It cannot be
    broken. An MTP is very weak, or a substitiution cypher is very weak
    unless the substition block is really large.
    OTPs are not fun. They are boring, because there is no way they can be broken, unless you capture the key. But of course that is their problem
    since you have to get the key to the recipient, without the enemy
    capturing the key, and the key is huge, so hard to hide.

    All correct, and also Whoosh!...

    The OP (the Doctor, likely trolling as he has not again been seen in
    this thread) posted a string of sequential letters and numbers and
    asked what "encryption" was used.

    Jacob, in message <uqg2om$252r4$1@dont-email.me> correctly pointed out
    that /assuming/ it even was an "encrypted" output, that one way to have
    created the sequential string as the "cipher text" was to specially
    craft an OTP "pad" for a known message to result in the given output.

    Stefan, in message <uqln3h$2pbms$1@i2pn2.org> asked how this could be
    done. My reply with the T=H substitution was an extremely simplified explanation of how one could craft a pad to cause a given output to
    appear.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From William Unruh@21:1/5 to Rich on Sun Feb 18 21:04:35 2024
    XPost: sci.crypt

    On 2024-02-17, Rich <rich@example.invalid> wrote:
    In sci.crypt William Unruh <unruh@invalid.ca> wrote:
    A One Time Pad means what it says. It can only be used once. It must be
    the same size as the message to be encrypted (ie you cannot use pad from
    earlier in the message to encode later stuff.) Otherwise it is weak. It
    is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other
    occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
    which is woefully weak. A OTP is unconditionally secret. It cannot be
    broken. An MTP is very weak, or a substitiution cypher is very weak
    unless the substition block is really large.
    OTPs are not fun. They are boring, because there is no way they can be
    broken, unless you capture the key. But of course that is their problem
    since you have to get the key to the recipient, without the enemy
    capturing the key, and the key is huge, so hard to hide.

    All correct, and also Whoosh!...

    The OP (the Doctor, likely trolling as he has not again been seen in
    this thread) posted a string of sequential letters and numbers and
    asked what "encryption" was used.

    Jacob, in message <uqg2om$252r4$1@dont-email.me> correctly pointed out
    that /assuming/ it even was an "encrypted" output, that one way to have created the sequential string as the "cipher text" was to specially
    craft an OTP "pad" for a known message to result in the given output.

    Stefan, in message <uqln3h$2pbms$1@i2pn2.org> asked how this could be
    done. My reply with the T=H substitution was an extremely simplified explanation of how one could craft a pad to cause a given output to
    appear.

    Take the original encrypted text. Write down ANY text of the same length
    as the encrypted text. Now take the bitwise xor of the original with
    your test. The result will be a one time pad which could have been used
    to encrypt your madeup text. Ie, you have found a one time pad which
    would decrypt the original encrypted text to your Any text.
    Of course the probability that your ANY text was what was originally
    encrypted is vanishingly small. (1/2^N) where N is the number of bits
    in the encrypted text. )f course if it were known to be english text
    that was encrypted, the probability is higher (about 1/2^(N/5) I think,
    but that still produces a very very small number, and is probably far
    worse than if you just dream the text that was encrypted)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Harnden@21:1/5 to Chris M. Thomasson on Tue Feb 20 21:55:28 2024
    XPost: sci.crypt

    On 20/02/2024 21:09, Chris M. Thomasson wrote:
    On 2/15/2024 11:02 AM, Stefan Claas wrote:
    Chris M. Thomasson wrote:

    On 2/13/2024 8:45 PM, Rich wrote:
    In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
    wrote:
    On 2/12/2024 5:30 PM, The Doctor wrote:
    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456

    None? lol. just kidding. Humm...

    Some combination of plaintext, secret key and cipher algorithm
    generated it.  Probably, the plaintext was hand crafted?  ;^)

    As Jacob correctly pointed out, if one knows the message, one can
    then 'hand craft' a one-time-pad to generate exactly this output
    from that message.

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this? I mean the OP IMHO does not show an encrypted
    string, done with an OTP. OTPs nature is that it does not include
    patterns and is totally random.

    If Bob and Alice have access to the same OPT, one of them can create a special plaintext that can give the message in the ciphertext, or
    whatever... Think about it... ;^)


    If the ciphertext is just going to be 123...abc..., then there is no
    point in transmitting it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From The Doctor@21:1/5 to nospam.harnden@invalid.com on Tue Feb 20 22:17:47 2024
    XPost: sci.crypt

    In article <ur374g$2n32c$1@dont-email.me>,
    Richard Harnden <nospam.harnden@invalid.com> wrote:
    On 20/02/2024 21:09, Chris M. Thomasson wrote:
    On 2/15/2024 11:02 AM, Stefan Claas wrote:
    Chris M. Thomasson wrote:

    On 2/13/2024 8:45 PM, Rich wrote:
    In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
    wrote:
    On 2/12/2024 5:30 PM, The Doctor wrote:
    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456

    None? lol. just kidding. Humm...

    Some combination of plaintext, secret key and cipher algorithm
    generated it.  Probably, the plaintext was hand crafted?  ;^)

    As Jacob correctly pointed out, if one knows the message, one can
    then 'hand craft' a one-time-pad to generate exactly this output
    from that message.

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this? I mean the OP IMHO does not show an encrypted
    string, done with an OTP. OTPs nature is that it does not include
    patterns and is totally random.

    If Bob and Alice have access to the same OPT, one of them can create a
    special plaintext that can give the message in the ciphertext, or
    whatever... Think about it... ;^)


    If the ciphertext is just going to be 123...abc..., then there is no
    point in transmitting it.




    Basically a generic code!
    --
    Member - Liberal International This is doctor@nk.ca Ici doctor@nk.ca
    Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising! Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen What worth the power of law that won't stop lawlessness? -unknown

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From William Unruh@21:1/5 to Chris M. Thomasson on Tue Feb 20 23:47:02 2024
    XPost: sci.crypt

    On 2024-02-20, Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
    On 2/15/2024 11:02 AM, Stefan Claas wrote:
    Chris M. Thomasson wrote:

    On 2/13/2024 8:45 PM, Rich wrote:
    In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
    wrote:
    On 2/12/2024 5:30 PM, The Doctor wrote:
    Deos anyone how what encryption is being used here?

    *1234567890ABCDEF01234567890ABCDEF0123456

    None? lol. just kidding. Humm...

    Some combination of plaintext, secret key and cipher algorithm
    generated it. Probably, the plaintext was hand crafted? ;^)

    As Jacob correctly pointed out, if one knows the message, one can
    then 'hand craft' a one-time-pad to generate exactly this output
    from that message.

    Or even the other way around? If one knows the OTP (Bob and/or
    Alice), they can create a special plaintext that generates this
    output for fun.

    How would you do this? I mean the OP IMHO does not show an encrypted
    string, done with an OTP. OTPs nature is that it does not include
    patterns and is totally random.

    If Bob and Alice have access to the same OPT, one of them can create a special plaintext that can give the message in the ciphertext, or
    whatever... Think about it... ;^)

    Yes, Just do the inverse of the OTP (if it is just xor then xor is also
    the inverst) and run it over the encrypted text and get what would have
    to have beenused to generate that encrypted text. But one of the
    absolutely critical things about OTPs is that it should be irremediably destroyed after it is used to encrypt the message. So only the person
    who ha not already used the OTP should have the OTP.





    Even if this string is not encrypted and only encoded, how would one
    get such pattern from plain text and convert it back to plain text?

    OTP xor PlainText=EncryptedText
    OTP xor EncryptedText=PlainText.


    It had been best if the OP had posted a reference URL ...

    Regards
    Stefan


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Chris M. Thomasson on Wed Feb 21 19:24:16 2024
    XPost: sci.crypt

    Chris M. Thomasson wrote:

    If Bob and Alice have access to the same OPT, one of them can create
    a special plaintext that can give the message in the ciphertext, or whatever... Think about it... ;^)

    Can you craft an example, maybe with code (that compiles ...)?

    BTW. I would appreciate if you and other sci.crypt regulars
    can sign my guestbook, on my Gemini-Capsule.

    gemini://tilde.club/~pollux/

    The guestbook is under Gästebuch.

    I am thinking about to set-up a cryptobook for us in Geminispace,
    so that small encrypted messages can be left there ... ;-)

    Regards
    Stefan
    --
    ----Ed25519 Signature---- d9ebda51717e5bf7c606c460e632d40daa4fa4315574e6aa5b030d60a79654d0 6fa37e28bed2cc9d8ec7ba5d51dd97faa279d0ccc208092802bedc262e88bc0e

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Chris M. Thomasson on Fri Feb 23 15:00:00 2024
    XPost: sci.crypt

    Chris M. Thomasson wrote:

    On 2/21/2024 10:24 AM, Stefan Claas wrote:
    Chris M. Thomasson wrote:

    If Bob and Alice have access to the same OPT, one of them can
    create a special plaintext that can give the message in the
    ciphertext, or whatever... Think about it... ;^)

    Can you craft an example, maybe with code (that compiles ...)?

    BTW. I would appreciate if you and other sci.crypt regulars
    can sign my guestbook, on my Gemini-Capsule.

    gemini://tilde.club/~pollux/

    The guestbook is under Gästebuch.

    I am thinking about to set-up a cryptobook for us in Geminispace,
    so that small encrypted messages can be left there ... ;-)


    http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=
    9c113c0799ac3d9b52edbf3429aa673022d46643c5689d93f7cc16688e99961c249bb349a7c6a1c9603ddc793f613cb08a32d3c8284f6dd1a0e9fe3d2cbaf4b32d9717a7be19a1b4934a1e5c5b653ce9213e2acf0cd24a9af41789f9c0bba9fbe2f835a31fe35d90b95514f4d3ad1261e8fc3de2268fec68037bce2dc315ed0
    668cfd03c78335c171123bc164cca83816da4

    Gemini is an Internet Protocol, starting with gemini:// and a mixture
    of gopher and classic html.

    Regards
    Stefan
    --
    ----Ed25519 Signature---- a3ea8d7848721a39804504886a973579eba929486734109e6a345b7d187c405b 4e2d0b5662ed90305670277288fce36151675d3789e48c9e334141e2613ab103

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Stefan Claas on Fri Feb 23 19:59:30 2024
    XPost: sci.crypt

    Stefan Claas wrote:

    Gemini is an Internet Protocol, starting with gemini:// and a mixture
    of gopher and classic html.

    https://github.com/kr1sp1n/awesome-gemini

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 0d1bafdd4013b840a05c4a6b7218a01ce97f7e6faa213f917ae861a12af38d8c 1f1d33e84cc5547aa35c164ac810872324c8ebe738d8df9f00d301a332ae0e07

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Chris M. Thomasson on Sat Feb 24 20:25:59 2024
    XPost: sci.crypt

    Chris M. Thomasson wrote:

    On 2/23/2024 10:59 AM, Stefan Claas wrote:
    Stefan Claas wrote:

    Gemini is an Internet Protocol, starting with gemini:// and a
    mixture of gopher and classic html.

    https://github.com/kr1sp1n/awesome-gemini

    http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=
    19d672f834593b161ffb1338f77bd51aa5328ab1854b531f33d415ac79ddb154a85beacb0a155cb64b47e551cadf2ad22ad689920bcdc670d1283d337413b691cd1294db0a7ae44bf6e5a9aa3adc138d4a7e2807c48c6612b1674b3caba2257776bfad003601cc973d6d95e2bab113cd7f70be4e8309c8a34a8c2aab53d5115
    76093be2f566d67552c85812070ded60528b863f414a1e15a768302fe0bfabd28ed46d6593f32f33a0c1c4168dea84e722251a6f231979e93c1ba7c30

    A little busy right now.


    No Problem! Don't forget to sign my guestbook (Gästebuch),
    when exploring Geminispace. ;-)

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 2f610593c193e717c188b9cc56c8d99a724227c8f67107f41c1714bb54e9e7fc 60c9bb65e4c1ade36179980d8a4d560ea18e358af033d56f54d0fbcedb658f06

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)