Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

He's dead, Jim.


devel / sci.crypt / Patterns

SubjectAuthor
* PatternsThe Doctor
+- Re: PatternsJakob Bohm
`* Re: PatternsChris M. Thomasson
 `* Re: PatternsRich
  `* Re: PatternsChris M. Thomasson
   `* Re: PatternsStefan Claas
    +* Re: PatternsRich
    |`* Re: PatternsStefan Claas
    | `* Re: PatternsChris M. Thomasson
    |  `* Re: PatternsStefan Claas
    |   `* Re: PatternsStefan Claas
    |    `* Re: PatternsChris M. Thomasson
    |     `* Re: PatternsWilliam Unruh
    |      +- Re: PatternsChris M. Thomasson
    |      `* Re: PatternsRich
    |       `- Re: PatternsWilliam Unruh
    `* Re: PatternsChris M. Thomasson
     +* Re: PatternsRichard Harnden
     |+* Re: PatternsChris M. Thomasson
     ||`- Re: PatternsChris M. Thomasson
     |`- Re: PatternsThe Doctor
     +- Re: PatternsWilliam Unruh
     `* Re: PatternsStefan Claas
      +* Re: PatternsChris M. Thomasson
      |`* Re: PatternsStefan Claas
      | `* Re: PatternsStefan Claas
      |  `* Re: PatternsChris M. Thomasson
      |   `- Re: PatternsStefan Claas
      `* Re: PatternsRich
       `* Re: PatternsStefan Claas
        +* Re: PatternsRich
        |`* Re: PatternsStefan Claas
        | `* Re: PatternsChris M. Thomasson
        |  `* Re: PatternsStefan Claas
        |   `* Re: PatternsRichard Harnden
        |    `* Re: PatternsStefan Claas
        |     +* Re: PatternsStefan Claas
        |     |`* Re: PatternsRichard Harnden
        |     | `* Re: PatternsStefan Claas
        |     |  +* Re: PatternsRich
        |     |  |`* Re: PatternsStefan Claas
        |     |  | `- Re: PatternsStefan Claas
        |     |  `- Re: PatternsChris M. Thomasson
        |     `- Re: PatternsRich
        `* Re: PatternsDoc O'Leary ,
         `- Re: PatternsStefan Claas

Pages:12
Patterns

<uqegno$2j5g$1@gallifrey.nk.ca>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=765&group=sci.crypt#765

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.hispagatos.org!newsfeed.endofthelinebbs.com!panix!weretis.net!feeder6.news.weretis.net!news.nk.ca!.POSTED.doctor.nl2k.ab.ca!not-for-mail
From: doctor@doctor.nl2k.ab.ca (The Doctor)
Newsgroups: comp.security.unix,sci.crypt
Subject: Patterns
Date: Tue, 13 Feb 2024 01:30:32 -0000 (UTC)
Organization: NetKnow News
Message-ID: <uqegno$2j5g$1@gallifrey.nk.ca>
Injection-Date: Tue, 13 Feb 2024 01:30:32 -0000 (UTC)
Injection-Info: gallifrey.nk.ca; posting-host="doctor.nl2k.ab.ca:204.209.81.1";
logging-data="85168"; mail-complaints-to="usenet@gallifrey.nk.ca"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: doctor@doctor.nl2k.ab.ca (The Doctor)
 by: The Doctor - Tue, 13 Feb 2024 01:30 UTC

Deos anyone how what encryption is being used here?

*1234567890ABCDEF01234567890ABCDEF0123456
--
Member - Liberal International This is doctor@nk.ca Ici doctor@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen
The ignorant won't rest until everyone is as dumb as they are. -unknown Beware https://mindspring.com

Re: Patterns

<uqg2om$252r4$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=766&group=sci.crypt#766

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jb-usenet@wisemo.invalid (Jakob Bohm)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 13 Feb 2024 16:44:22 +0100
Organization: WiseMo A/S
Lines: 21
Message-ID: <uqg2om$252r4$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 13 Feb 2024 15:44:22 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6cdbbdfce66f86ec0d3540a2ccc7616d";
logging-data="2263908"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/VaFyCpGOV+KfPGDXA14HM2BcmZnWnUSg="
Cancel-Lock: sha1:BlImE/OUShYLc2eSfybIXHSZKPY=
In-Reply-To: <uqegno$2j5g$1@gallifrey.nk.ca>
Content-Language: en-US
X-Mailer: Epyrus/2.1.2
 by: Jakob Bohm - Tue, 13 Feb 2024 15:44 UTC

On 2024-02-13 02:30, The Doctor wrote:
> Deos anyone how what encryption is being used here?
>
> *1234567890ABCDEF01234567890ABCDEF0123456
>

Probably a one time pad customized to generating this particular
"ciphertext" for a specific plaintext. Of cause, this can only
be done by knowing the message before the key is chosen, thus
making it equally easy to just share the plaintext over that key
distribution channel .

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

Re: Patterns

<uqgk8m$28cuj$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=767&group=sci.crypt#767

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 13 Feb 2024 12:43:03 -0800
Organization: A noiseless patient Spider
Lines: 9
Message-ID: <uqgk8m$28cuj$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 13 Feb 2024 20:43:03 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="69c06572627bbaa997447eab47478cf8";
logging-data="2372563"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Ch4TYDmr2F6mHOVNT+6QKYPXKG4O3de4="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:iFKjX2RDhXkVXafJa9dCVHc06lY=
Content-Language: en-US
In-Reply-To: <uqegno$2j5g$1@gallifrey.nk.ca>
 by: Chris M. Thomasson - Tue, 13 Feb 2024 20:43 UTC

On 2/12/2024 5:30 PM, The Doctor wrote:
> Deos anyone how what encryption is being used here?
>
> *1234567890ABCDEF01234567890ABCDEF0123456

None? lol. just kidding. Humm...

Some combination of plaintext, secret key and cipher algorithm generated
it. Probably, the plaintext was hand crafted? ;^)

Re: Patterns

<uqhgi2$2gjm1$2@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=768&group=sci.crypt#768

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Wed, 14 Feb 2024 04:45:54 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <uqhgi2$2gjm1$2@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
Injection-Date: Wed, 14 Feb 2024 04:45:54 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="0dc5ce98a6e79c0cb0ceb7a2a466ff30";
logging-data="2641601"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+DOI3VaMLjqdDbq85CX99p"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:pNlRdF5aYX7Tjuv/TlSinFO6Wmc=
 by: Rich - Wed, 14 Feb 2024 04:45 UTC

In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
> On 2/12/2024 5:30 PM, The Doctor wrote:
>> Deos anyone how what encryption is being used here?
>>
>> *1234567890ABCDEF01234567890ABCDEF0123456
>
> None? lol. just kidding. Humm...
>
> Some combination of plaintext, secret key and cipher algorithm
> generated it. Probably, the plaintext was hand crafted? ;^)

As Jacob correctly pointed out, if one knows the message, one can then
'hand craft' a one-time-pad to generate exactly this output from that
message. The usual issues with getting the OTP to Bob so Bob can
decrypt still apply.

Re: Patterns

<uqj7eo$2q28i$3@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=769&group=sci.crypt#769

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Wed, 14 Feb 2024 12:22:48 -0800
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <uqj7eo$2q28i$3@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 14 Feb 2024 20:22:48 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="45095f52c73b7367c090d0e10429090a";
logging-data="2951442"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19vDt7lF93pTEJyyTCreY82dtEkRYyLo2o="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:VqtyNgI6zlIm1OpIC6MFQo0wDd8=
Content-Language: en-US
In-Reply-To: <uqhgi2$2gjm1$2@dont-email.me>
 by: Chris M. Thomasson - Wed, 14 Feb 2024 20:22 UTC

On 2/13/2024 8:45 PM, Rich wrote:
> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>> Deos anyone how what encryption is being used here?
>>>
>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>
>> None? lol. just kidding. Humm...
>>
>> Some combination of plaintext, secret key and cipher algorithm
>> generated it. Probably, the plaintext was hand crafted? ;^)
>
> As Jacob correctly pointed out, if one knows the message, one can then
> 'hand craft' a one-time-pad to generate exactly this output from that
> message.

Or even the other way around? If one knows the OTP (Bob and/or Alice),
they can create a special plaintext that generates this output for fun.

> The usual issues with getting the OTP to Bob so Bob can
> decrypt still apply.

Indeed.

Re: Patterns

<uqln3h$2pbms$1@i2pn2.org>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=770&group=sci.crypt#770

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 15 Feb 2024 20:02:08 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqln3h$2pbms$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 15 Feb 2024 19:02:09 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2928348"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Thu, 15 Feb 2024 19:02 UTC

Chris M. Thomasson wrote:

> On 2/13/2024 8:45 PM, Rich wrote:
> > In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
> > wrote:
> >> On 2/12/2024 5:30 PM, The Doctor wrote:
> >>> Deos anyone how what encryption is being used here?
> >>>
> >>> *1234567890ABCDEF01234567890ABCDEF0123456
> >>
> >> None? lol. just kidding. Humm...
> >>
> >> Some combination of plaintext, secret key and cipher algorithm
> >> generated it. Probably, the plaintext was hand crafted? ;^)
> >
> > As Jacob correctly pointed out, if one knows the message, one can
> > then 'hand craft' a one-time-pad to generate exactly this output
> > from that message.
>
> Or even the other way around? If one knows the OTP (Bob and/or
> Alice), they can create a special plaintext that generates this
> output for fun.

How would you do this? I mean the OP IMHO does not show an encrypted
string, done with an OTP. OTPs nature is that it does not include
patterns and is totally random.

Even if this string is not encrypted and only encoded, how would one
get such pattern from plain text and convert it back to plain text?

It had been best if the OP had posted a reference URL ...

Regards
Stefan
--
----Ed25519 Signature----
924d68b09939ff530a360fb2865c20195c09f0c0278c1e189d9a2ec3d036d252
c1fb0947cde91b30f3a85319c063eb0d72fce5b739a2bd9ea09bc55bb65e4e01

Re: Patterns

<uqlq0s$3f0e5$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=771&group=sci.crypt#771

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.chmurka.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 15 Feb 2024 19:51:56 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 73
Message-ID: <uqlq0s$3f0e5$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me> <uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me> <uqln3h$2pbms$1@i2pn2.org>
Injection-Date: Thu, 15 Feb 2024 19:51:56 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="978bd7dc09981b8e0a3de073db6a310f";
logging-data="3637701"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19A1Es8lpPDnt1iqW/nY6b5"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:vdggPN7bnSwgwhHWGfxVeUdhFQI=
 by: Rich - Thu, 15 Feb 2024 19:51 UTC

In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> Chris M. Thomasson wrote:
>
>> On 2/13/2024 8:45 PM, Rich wrote:
>> > In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>> > wrote:
>> >> On 2/12/2024 5:30 PM, The Doctor wrote:
>> >>> Deos anyone how what encryption is being used here?
>> >>>
>> >>> *1234567890ABCDEF01234567890ABCDEF0123456
>> >>
>> >> None? lol. just kidding. Humm...
>> >>
>> >> Some combination of plaintext, secret key and cipher algorithm
>> >> generated it. Probably, the plaintext was hand crafted? ;^)
>> >
>> > As Jacob correctly pointed out, if one knows the message, one can
>> > then 'hand craft' a one-time-pad to generate exactly this output
>> > from that message.
>>
>> Or even the other way around? If one knows the OTP (Bob and/or
>> Alice), they can create a special plaintext that generates this
>> output for fun.
>
> How would you do this?

For a traditional, 1940's substution style OTP, it is trivial:

Message: The

Pad:

T=H
e=r
h=e

Substitute using the pad, get the encrypted message: Her

One can do the same in reverse, if one has an encrypted message, one
can "fashion" a "pad" that will appear to make the message decrypt to
anything you like (so long as "anything" is the same length as the
encrypted message). Note that for the above I picked that pad on
purpose so that "The" would /encrypt/ to "Her".

If one uses XOR to encrypt using their OTP then fashioning a "pad" to
transform X into Y is simply byte wise X (xor) Y. The result is a pad
that will transform X into Y (or Y into X) by XOR.

> I mean the OP IMHO does not show an encrypted string, done with an
> OTP.

That's the magic of OTP's that provide their prefect secrecy, we can't
know if that is an ecrypted string, decrypted string, or just random
line noise. All possible "decryptions" are possible, and finding the
one 'needle' in the haystack of "not the right pad this time" is
troublesome. Less so in today's world where a computer can "spell
check" the message and dismiss much of the hay in a near instant.

> OTPs nature is that it does not include patterns and is totally
> random.

Properly secure OTP's, yes. But we can't know with certianty that OP's
original string was not from a 'custom crafted OTP'.

> Even if this string is not encrypted and only encoded, how would one
> get such pattern from plain text and convert it back to plain text?

By choosing the "encoding" in order to make such happen.

> It had been best if the OP had posted a reference URL ...

I doubt OP found the string at some URL. I suspect the OP was
trolling.

Re: Patterns

<uqlrlj$2pi12$1@i2pn2.org>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=772&group=sci.crypt#772

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 15 Feb 2024 21:20:03 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqlrlj$2pi12$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<uqlq0s$3f0e5$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 15 Feb 2024 20:20:04 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2934818"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
 by: Stefan Claas - Thu, 15 Feb 2024 20:20 UTC

Rich wrote:

> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> > Chris M. Thomasson wrote:

> >> Or even the other way around? If one knows the OTP (Bob and/or
> >> Alice), they can create a special plaintext that generates this
> >> output for fun.
> >
> > How would you do this?
>
> For a traditional, 1940's substution style OTP, it is trivial:
>
> Message: The
>
> Pad:
>
> T=H
> e=r
> h=e
>
> Substitute using the pad, get the encrypted message: Her

Well, one uses a substitution table, trigraph, etc. and then
a pad to encrypt the message. Otherwise it would be a plain
text encoded message, right?
> > It had been best if the OP had posted a reference URL ...
>
> I doubt OP found the string at some URL. I suspect the OP was
> trolling.

That was my thought too and the reason why I did not reply to him
directly.

Regards
Stefan
--
----Ed25519 Signature----
cec364f80a628ea8fa2d4734e0cf804ad331b8d6f2e65c1f2f7441fc2728186c
2cc5ce7d3e5d69a80c0140c8973536ed840a5613f727eb5924612d392b7ea202

Re: Patterns

<uqmhtl$3ilmr$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=773&group=sci.crypt#773

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!nntp.comgw.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 15 Feb 2024 18:39:48 -0800
Organization: A noiseless patient Spider
Lines: 43
Message-ID: <uqmhtl$3ilmr$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 02:39:49 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="34f0c8e038f7a06168c763d47f140a42";
logging-data="3757787"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/LeC6ZPiVGoq7urXAqFxRfn4sK/S4kuI0="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:0rl7X17yDVUebWodopXuoQl0k8I=
Content-Language: en-US
In-Reply-To: <uqlrlj$2pi12$1@i2pn2.org>
 by: Chris M. Thomasson - Fri, 16 Feb 2024 02:39 UTC

On 2/15/2024 12:20 PM, Stefan Claas wrote:
> Rich wrote:
>
>> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
>>> Chris M. Thomasson wrote:
>
>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>> Alice), they can create a special plaintext that generates this
>>>> output for fun.
>>>
>>> How would you do this?
>>
>> For a traditional, 1940's substution style OTP, it is trivial:
>>
>> Message: The
>>
>> Pad:
>>
>> T=H
>> e=r
>> h=e
>>
>> Substitute using the pad, get the encrypted message: Her
>
> Well, one uses a substitution table, trigraph, etc. and then
> a pad to encrypt the message. Otherwise it would be a plain
> text encoded message, right?

Give me a OPT 3 bytes long. Creating a plaintext that results in a
ciphertext of say 123, or ABC is possible...

>
>>> It had been best if the OP had posted a reference URL ...
>>
>> I doubt OP found the string at some URL. I suspect the OP was
>> trolling.
>
> That was my thought too and the reason why I did not reply to him
> directly.
>
> Regards
> Stefan

Re: Patterns

<uqo45v$2sl5o$1@i2pn2.org>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=774&group=sci.crypt#774

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 17:57:32 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqo45v$2sl5o$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org>
<uqmhtl$3ilmr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 16:57:35 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3036344"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Fri, 16 Feb 2024 16:57 UTC

Chris M. Thomasson wrote:

> On 2/15/2024 12:20 PM, Stefan Claas wrote:
> > Rich wrote:
> >
> >> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> >>> Chris M. Thomasson wrote:
> >
> >>>> Or even the other way around? If one knows the OTP (Bob and/or
> >>>> Alice), they can create a special plaintext that generates this
> >>>> output for fun.
> >>>
> >>> How would you do this?
> >>
> >> For a traditional, 1940's substution style OTP, it is trivial:
> >>
> >> Message: The
> >>
> >> Pad:
> >>
> >> T=H
> >> e=r
> >> h=e
> >>
> >> Substitute using the pad, get the encrypted message: Her
> >
> > Well, one uses a substitution table, trigraph, etc. and then
> > a pad to encrypt the message. Otherwise it would be a plain
> > text encoded message, right?
>
> Give me a OPT 3 bytes long. Creating a plaintext that results in a
> ciphertext of say 123, or ABC is possible...

Yes, but then it is not OTP encryption and only plain code, done
with substitution, I would say. The OP's Subject: is Patterns.

Regards
Stefan
--
----Ed25519 Signature----
0722421a0b6680c4ade0fcaac8d76552cf746531dd89eeca1b7db32ecef8bceb
9c4ca60a0298d56bd96340d8a4a1b05bc4c38d6fcf13d8aa2633018b09f0ff0f

Re: Patterns

<uqo4p7$2sl5o$2@i2pn2.org>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=775&group=sci.crypt#775

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 18:07:48 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <uqo4p7$2sl5o$2@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org>
<uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 17:07:51 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3036344"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
X-Spam-Checker-Version: SpamAssassin 4.0.0
 by: Stefan Claas - Fri, 16 Feb 2024 17:07 UTC

Stefan Claas wrote:

> Chris M. Thomasson wrote:
>
> > On 2/15/2024 12:20 PM, Stefan Claas wrote:
> > > Rich wrote:
> > >
> > >> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> > >>> Chris M. Thomasson wrote:
> > >
> > >>>> Or even the other way around? If one knows the OTP (Bob and/or
> > >>>> Alice), they can create a special plaintext that generates this
> > >>>> output for fun.
> > >>>
> > >>> How would you do this?
> > >>
> > >> For a traditional, 1940's substution style OTP, it is trivial:
> > >>
> > >> Message: The
> > >>
> > >> Pad:
> > >>
> > >> T=H
> > >> e=r
> > >> h=e
> > >>
> > >> Substitute using the pad, get the encrypted message: Her
> > >
> > > Well, one uses a substitution table, trigraph, etc. and then
> > > a pad to encrypt the message. Otherwise it would be a plain
> > > text encoded message, right?
> >
> > Give me a OPT 3 bytes long. Creating a plaintext that results in a
> > ciphertext of say 123, or ABC is possible...
>
> Yes, but then it is not OTP encryption and only plain code, done
> with substitution, I would say. The OP's Subject: is Patterns.

To be more clear, an OTP encrypted message with digits or letters
can of course include 3-5 letter words or a 3-5 digits sequence, but
in case of OTPs this means nothing and I would not call it pattern,
in an encrypted message.

Regards
Stefan
--
----Ed25519 Signature----
48c677c37bef1ad110bea0c0c42da8846f5b1e628b1b04d6f2400cc4696c5171
361fc85f7b1c3ebd65756278b51194f681428720b3b4360c13b7c3d306fd8d0f

Re: Patterns

<uqogdn$mfr$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=776&group=sci.crypt#776

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.samoylyk.net!usenet.goja.nl.eu.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 12:26:30 -0800
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <uqogdn$mfr$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org> <uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org> <uqo4p7$2sl5o$2@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Feb 2024 20:26:32 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="34f0c8e038f7a06168c763d47f140a42";
logging-data="23035"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/Ql51fWIDcUf0ShCidE+4y5vvDK68gCkA="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:AlqaDMCUl4TgNPZD2SeV2WVI0e4=
Content-Language: en-US
In-Reply-To: <uqo4p7$2sl5o$2@i2pn2.org>
 by: Chris M. Thomasson - Fri, 16 Feb 2024 20:26 UTC

On 2/16/2024 9:07 AM, Stefan Claas wrote:
> Stefan Claas wrote:
>
>> Chris M. Thomasson wrote:
>>
>>> On 2/15/2024 12:20 PM, Stefan Claas wrote:
>>>> Rich wrote:
>>>>
>>>>> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
>>>>>> Chris M. Thomasson wrote:
>>>>
>>>>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>>>>> Alice), they can create a special plaintext that generates this
>>>>>>> output for fun.
>>>>>>
>>>>>> How would you do this?
>>>>>
>>>>> For a traditional, 1940's substution style OTP, it is trivial:
>>>>>
>>>>> Message: The
>>>>>
>>>>> Pad:
>>>>>
>>>>> T=H
>>>>> e=r
>>>>> h=e
>>>>>
>>>>> Substitute using the pad, get the encrypted message: Her
>>>>
>>>> Well, one uses a substitution table, trigraph, etc. and then
>>>> a pad to encrypt the message. Otherwise it would be a plain
>>>> text encoded message, right?
>>>
>>> Give me a OPT 3 bytes long. Creating a plaintext that results in a
>>> ciphertext of say 123, or ABC is possible...
>>
>> Yes, but then it is not OTP encryption and only plain code, done
>> with substitution, I would say. The OP's Subject: is Patterns.
>
> To be more clear, an OTP encrypted message with digits or letters
> can of course include 3-5 letter words or a 3-5 digits sequence, but
> in case of OTPs this means nothing and I would not call it pattern,
> in an encrypted message.
>

AFAICT, it all boils down to fun with OTP's... ;^)

Re: Patterns

<uqoudq$35ch$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=777&group=sci.crypt#777

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: unruh@invalid.ca (William Unruh)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Sat, 17 Feb 2024 00:25:30 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 62
Message-ID: <uqoudq$35ch$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org> <uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org> <uqo4p7$2sl5o$2@i2pn2.org>
<uqogdn$mfr$1@dont-email.me>
Injection-Date: Sat, 17 Feb 2024 00:25:30 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="65e7ecad65b47d8c56f0043a69e10e00";
logging-data="103825"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18FwT7WtBwT4gxIUHPTisB4"
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:ZMy7nOmx4K5WOzDrqMo7/Vpm4Oc=
 by: William Unruh - Sat, 17 Feb 2024 00:25 UTC

On 2024-02-16, Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
> On 2/16/2024 9:07 AM, Stefan Claas wrote:
>> Stefan Claas wrote:
>>
>>> Chris M. Thomasson wrote:
>>>
>>>> On 2/15/2024 12:20 PM, Stefan Claas wrote:
>>>>> Rich wrote:
>>>>>
>>>>>> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
>>>>>>> Chris M. Thomasson wrote:
>>>>>
>>>>>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>>>>>> Alice), they can create a special plaintext that generates this
>>>>>>>> output for fun.
>>>>>>>
>>>>>>> How would you do this?
>>>>>>
>>>>>> For a traditional, 1940's substution style OTP, it is trivial:
>>>>>>
>>>>>> Message: The
>>>>>>
>>>>>> Pad:
>>>>>>
>>>>>> T=H
>>>>>> e=r
>>>>>> h=e
>>>>>>
>>>>>> Substitute using the pad, get the encrypted message: Her
>>>>>
>>>>> Well, one uses a substitution table, trigraph, etc. and then
>>>>> a pad to encrypt the message. Otherwise it would be a plain
>>>>> text encoded message, right?
>>>>
>>>> Give me a OPT 3 bytes long. Creating a plaintext that results in a
>>>> ciphertext of say 123, or ABC is possible...
>>>
>>> Yes, but then it is not OTP encryption and only plain code, done
>>> with substitution, I would say. The OP's Subject: is Patterns.
>>
>> To be more clear, an OTP encrypted message with digits or letters
>> can of course include 3-5 letter words or a 3-5 digits sequence, but
>> in case of OTPs this means nothing and I would not call it pattern,
>> in an encrypted message.
>>
>
> AFAICT, it all boils down to fun with OTP's... ;^)
>

A One Time Pad means what it says. It can only be used once. It must be
the same size as the message to be encrypted (ie you cannot use pad from
earlier in the message to encode later stuff.) Otherwise it is weak. It
is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other
occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
which is woefully weak. A OTP is unconditionally secret. It cannot be
broken. An MTP is very weak, or a substitiution cypher is very weak
unless the substition block is really large.
OTPs are not fun. They are boring, because there is no way they can be
broken, unless you capture the key. But of course that is their problem
since you have to get the key to the recipient, without the enemy
capturing the key, and the key is huge, so hard to hide.

Re: Patterns

<uqp15c$3fmc$3@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=778&group=sci.crypt#778

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Fri, 16 Feb 2024 17:12:11 -0800
Organization: A noiseless patient Spider
Lines: 66
Message-ID: <uqp15c$3fmc$3@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org> <uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org> <uqo4p7$2sl5o$2@i2pn2.org>
<uqogdn$mfr$1@dont-email.me> <uqoudq$35ch$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 17 Feb 2024 01:12:12 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="e1558c86d6e9f7b89dd43e324f783dc6";
logging-data="114380"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18BhzAr/qkoIMcvxg9/KwE2r/Z3+kc+kvA="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:5aEgflZFfOL8Q0EaK9UwZ+R5Jn8=
In-Reply-To: <uqoudq$35ch$1@dont-email.me>
Content-Language: en-US
 by: Chris M. Thomasson - Sat, 17 Feb 2024 01:12 UTC

On 2/16/2024 4:25 PM, William Unruh wrote:
> On 2024-02-16, Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 2/16/2024 9:07 AM, Stefan Claas wrote:
>>> Stefan Claas wrote:
>>>
>>>> Chris M. Thomasson wrote:
>>>>
>>>>> On 2/15/2024 12:20 PM, Stefan Claas wrote:
>>>>>> Rich wrote:
>>>>>>
>>>>>>> In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
>>>>>>>> Chris M. Thomasson wrote:
>>>>>>
>>>>>>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>>>>>>> Alice), they can create a special plaintext that generates this
>>>>>>>>> output for fun.
>>>>>>>>
>>>>>>>> How would you do this?
>>>>>>>
>>>>>>> For a traditional, 1940's substution style OTP, it is trivial:
>>>>>>>
>>>>>>> Message: The
>>>>>>>
>>>>>>> Pad:
>>>>>>>
>>>>>>> T=H
>>>>>>> e=r
>>>>>>> h=e
>>>>>>>
>>>>>>> Substitute using the pad, get the encrypted message: Her
>>>>>>
>>>>>> Well, one uses a substitution table, trigraph, etc. and then
>>>>>> a pad to encrypt the message. Otherwise it would be a plain
>>>>>> text encoded message, right?
>>>>>
>>>>> Give me a OPT 3 bytes long. Creating a plaintext that results in a
>>>>> ciphertext of say 123, or ABC is possible...
>>>>
>>>> Yes, but then it is not OTP encryption and only plain code, done
>>>> with substitution, I would say. The OP's Subject: is Patterns.
>>>
>>> To be more clear, an OTP encrypted message with digits or letters
>>> can of course include 3-5 letter words or a 3-5 digits sequence, but
>>> in case of OTPs this means nothing and I would not call it pattern,
>>> in an encrypted message.
>>>
>>
>> AFAICT, it all boils down to fun with OTP's... ;^)
>>
>
> A One Time Pad means what it says. It can only be used once. It must be
> the same size as the message to be encrypted (ie you cannot use pad from
> earlier in the message to encode later stuff.) Otherwise it is weak. It
> is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other
> occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
> which is woefully weak. A OTP is unconditionally secret. It cannot be
> broken. An MTP is very weak, or a substitiution cypher is very weak
> unless the substition block is really large.
> OTPs are not fun. They are boring, because there is no way they can be
> broken, unless you capture the key. But of course that is their problem
> since you have to get the key to the recipient, without the enemy
> capturing the key, and the key is huge, so hard to hide.
>

There can be some fun. Then it makes one, at least me, think about
prepending plaintext with TRNG data and whacking it with HMAC... ;^)

Re: Patterns

<uqpgpm$9deq$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=780&group=sci.crypt#780

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Sat, 17 Feb 2024 05:39:02 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <uqpgpm$9deq$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me> <uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me> <uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me> <uqlrlj$2pi12$1@i2pn2.org> <uqmhtl$3ilmr$1@dont-email.me> <uqo45v$2sl5o$1@i2pn2.org> <uqo4p7$2sl5o$2@i2pn2.org> <uqogdn$mfr$1@dont-email.me> <uqoudq$35ch$1@dont-email.me>
Injection-Date: Sat, 17 Feb 2024 05:39:02 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="7c9a53dbdfa1c636fa2b36f281396b0e";
logging-data="308698"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+s4zPjb46MJk5+EgKT6yYY"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:o0sgYMOdHqYo5Ba9rIsXQR9iVxU=
 by: Rich - Sat, 17 Feb 2024 05:39 UTC

In sci.crypt William Unruh <unruh@invalid.ca> wrote:
> A One Time Pad means what it says. It can only be used once. It must be
> the same size as the message to be encrypted (ie you cannot use pad from
> earlier in the message to encode later stuff.) Otherwise it is weak. It
> is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other
> occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
> which is woefully weak. A OTP is unconditionally secret. It cannot be
> broken. An MTP is very weak, or a substitiution cypher is very weak
> unless the substition block is really large.
> OTPs are not fun. They are boring, because there is no way they can be
> broken, unless you capture the key. But of course that is their problem
> since you have to get the key to the recipient, without the enemy
> capturing the key, and the key is huge, so hard to hide.

All correct, and also Whoosh!...

The OP (the Doctor, likely trolling as he has not again been seen in
this thread) posted a string of sequential letters and numbers and
asked what "encryption" was used.

Jacob, in message <uqg2om$252r4$1@dont-email.me> correctly pointed out
that /assuming/ it even was an "encrypted" output, that one way to have
created the sequential string as the "cipher text" was to specially
craft an OTP "pad" for a known message to result in the given output.

Stefan, in message <uqln3h$2pbms$1@i2pn2.org> asked how this could be
done. My reply with the T=H substitution was an extremely simplified
explanation of how one could craft a pad to cause a given output to
appear.

Re: Patterns

<uqtrd3$1el0g$2@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=781&group=sci.crypt#781

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: unruh@invalid.ca (William Unruh)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Sun, 18 Feb 2024 21:04:35 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 43
Message-ID: <uqtrd3$1el0g$2@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <uqlq0s$3f0e5$1@dont-email.me>
<uqlrlj$2pi12$1@i2pn2.org> <uqmhtl$3ilmr$1@dont-email.me>
<uqo45v$2sl5o$1@i2pn2.org> <uqo4p7$2sl5o$2@i2pn2.org>
<uqogdn$mfr$1@dont-email.me> <uqoudq$35ch$1@dont-email.me>
<uqpgpm$9deq$1@dont-email.me>
Injection-Date: Sun, 18 Feb 2024 21:04:35 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="cce7bbd48047459bbc7cb80f315b42f6";
logging-data="1528848"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18w22Fh/rvdUlVsvZyOfQpw"
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:wYMFxXogYLk5Sz5Tnu7b80mPvrU=
 by: William Unruh - Sun, 18 Feb 2024 21:04 UTC

On 2024-02-17, Rich <rich@example.invalid> wrote:
> In sci.crypt William Unruh <unruh@invalid.ca> wrote:
>> A One Time Pad means what it says. It can only be used once. It must be
>> the same size as the message to be encrypted (ie you cannot use pad from
>> earlier in the message to encode later stuff.) Otherwise it is weak. It
>> is not a substition cypher (eg your T=H e=r h=e ) to encrypt any other
>> occrances of T, h or e. That is NOT an OTP. It is a MRP (Many time pad)
>> which is woefully weak. A OTP is unconditionally secret. It cannot be
>> broken. An MTP is very weak, or a substitiution cypher is very weak
>> unless the substition block is really large.
>> OTPs are not fun. They are boring, because there is no way they can be
>> broken, unless you capture the key. But of course that is their problem
>> since you have to get the key to the recipient, without the enemy
>> capturing the key, and the key is huge, so hard to hide.
>
> All correct, and also Whoosh!...
>
> The OP (the Doctor, likely trolling as he has not again been seen in
> this thread) posted a string of sequential letters and numbers and
> asked what "encryption" was used.
>
> Jacob, in message <uqg2om$252r4$1@dont-email.me> correctly pointed out
> that /assuming/ it even was an "encrypted" output, that one way to have
> created the sequential string as the "cipher text" was to specially
> craft an OTP "pad" for a known message to result in the given output.
>
> Stefan, in message <uqln3h$2pbms$1@i2pn2.org> asked how this could be
> done. My reply with the T=H substitution was an extremely simplified
> explanation of how one could craft a pad to cause a given output to
> appear.

Take the original encrypted text. Write down ANY text of the same length
as the encrypted text. Now take the bitwise xor of the original with
your test. The result will be a one time pad which could have been used
to encrypt your madeup text. Ie, you have found a one time pad which
would decrypt the original encrypted text to your Any text.
Of course the probability that your ANY text was what was originally
encrypted is vanishingly small. (1/2^N) where N is the number of bits
in the encrypted text. )f course if it were known to be english text
that was encrypted, the probability is higher (about 1/2^(N/5) I think,
but that still produces a very very small number, and is probably far
worse than if you just dream the text that was encrypted)

Re: Patterns

<ur34f6$2mh1p$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=783&group=sci.crypt#783

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.samoylyk.net!newsfeed.xs3.de!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 13:09:57 -0800
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <ur34f6$2mh1p$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 20 Feb 2024 21:09:58 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="179eda77360736dadd068492fcb3f96b";
logging-data="2835513"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX189FhXDO4SKRAghx8K5vvwSGmQ/iKgq0BU="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:iMwCLdQeLNlvTJL5nAguVpqD1aE=
Content-Language: en-US
In-Reply-To: <uqln3h$2pbms$1@i2pn2.org>
 by: Chris M. Thomasson - Tue, 20 Feb 2024 21:09 UTC

On 2/15/2024 11:02 AM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>
>> On 2/13/2024 8:45 PM, Rich wrote:
>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>> wrote:
>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>> Deos anyone how what encryption is being used here?
>>>>>
>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>
>>>> None? lol. just kidding. Humm...
>>>>
>>>> Some combination of plaintext, secret key and cipher algorithm
>>>> generated it. Probably, the plaintext was hand crafted? ;^)
>>>
>>> As Jacob correctly pointed out, if one knows the message, one can
>>> then 'hand craft' a one-time-pad to generate exactly this output
>>> from that message.
>>
>> Or even the other way around? If one knows the OTP (Bob and/or
>> Alice), they can create a special plaintext that generates this
>> output for fun.
>
> How would you do this? I mean the OP IMHO does not show an encrypted
> string, done with an OTP. OTPs nature is that it does not include
> patterns and is totally random.

If Bob and Alice have access to the same OPT, one of them can create a
special plaintext that can give the message in the ciphertext, or
whatever... Think about it... ;^)

>
> Even if this string is not encrypted and only encoded, how would one
> get such pattern from plain text and convert it back to plain text?
>
> It had been best if the OP had posted a reference URL ...
>
> Regards
> Stefan

Re: Patterns

<ur374g$2n32c$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=784&group=sci.crypt#784

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.chmurka.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: richard.nospam@gmail.invalid (Richard Harnden)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 21:55:28 +0000
Organization: A noiseless patient Spider
Lines: 39
Message-ID: <ur374g$2n32c$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
Reply-To: nospam.harnden@invalid.com
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 20 Feb 2024 21:55:29 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="12f12da087b685d61b4fc5fde888a79c";
logging-data="2853964"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX189f54smlhTEKWdWfh9tcDLpOa+5IzX4Ds="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:u6AjpsbLArq6SI3IBWlsMZuzrGU=
Content-Language: en-GB
In-Reply-To: <ur34f6$2mh1p$1@dont-email.me>
 by: Richard Harnden - Tue, 20 Feb 2024 21:55 UTC

On 20/02/2024 21:09, Chris M. Thomasson wrote:
> On 2/15/2024 11:02 AM, Stefan Claas wrote:
>> Chris M. Thomasson wrote:
>>
>>> On 2/13/2024 8:45 PM, Rich wrote:
>>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>>> wrote:
>>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>>> Deos anyone how what encryption is being used here?
>>>>>>
>>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>>
>>>>> None? lol. just kidding. Humm...
>>>>>
>>>>> Some combination of plaintext, secret key and cipher algorithm
>>>>> generated it.  Probably, the plaintext was hand crafted?  ;^)
>>>>
>>>> As Jacob correctly pointed out, if one knows the message, one can
>>>> then 'hand craft' a one-time-pad to generate exactly this output
>>>> from that message.
>>>
>>> Or even the other way around? If one knows the OTP (Bob and/or
>>> Alice), they can create a special plaintext that generates this
>>> output for fun.
>>
>> How would you do this? I mean the OP IMHO does not show an encrypted
>> string, done with an OTP. OTPs nature is that it does not include
>> patterns and is totally random.
>
> If Bob and Alice have access to the same OPT, one of them can create a
> special plaintext that can give the message in the ciphertext, or
> whatever... Think about it... ;^)
>

If the ciphertext is just going to be 123...abc..., then there is no
point in transmitting it.

Re: Patterns

<ur3899$2nciu$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=785&group=sci.crypt#785

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!usenet.network!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 14:15:05 -0800
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <ur3899$2nciu$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur374g$2n32c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 20 Feb 2024 22:15:05 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="179eda77360736dadd068492fcb3f96b";
logging-data="2863710"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19AKCwqYIcypPxe2bkmkjJT5chgc11z2jE="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:cnwfBlHxgqnkrDBVD1qwkuOspgE=
Content-Language: en-US
In-Reply-To: <ur374g$2n32c$1@dont-email.me>
 by: Chris M. Thomasson - Tue, 20 Feb 2024 22:15 UTC

On 2/20/2024 1:55 PM, Richard Harnden wrote:
> On 20/02/2024 21:09, Chris M. Thomasson wrote:
>> On 2/15/2024 11:02 AM, Stefan Claas wrote:
>>> Chris M. Thomasson wrote:
>>>
>>>> On 2/13/2024 8:45 PM, Rich wrote:
>>>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>>>> wrote:
>>>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>>>> Deos anyone how what encryption is being used here?
>>>>>>>
>>>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>>>
>>>>>> None? lol. just kidding. Humm...
>>>>>>
>>>>>> Some combination of plaintext, secret key and cipher algorithm
>>>>>> generated it.  Probably, the plaintext was hand crafted?  ;^)
>>>>>
>>>>> As Jacob correctly pointed out, if one knows the message, one can
>>>>> then 'hand craft' a one-time-pad to generate exactly this output
>>>>> from that message.
>>>>
>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>> Alice), they can create a special plaintext that generates this
>>>> output for fun.
>>>
>>> How would you do this? I mean the OP IMHO does not show an encrypted
>>> string, done with an OTP. OTPs nature is that it does not include
>>> patterns and is totally random.
>>
>> If Bob and Alice have access to the same OPT, one of them can create a
>> special plaintext that can give the message in the ciphertext, or
>> whatever... Think about it... ;^)
>>
>
> If the ciphertext is just going to be 123...abc..., then there is no
> point in transmitting it.
>
>
>

Thing of using sections of a large OPT to get:

ciphertext: 123456789

plaintext: thefoxrun

Of source, alice is in on the fun. She says 123456789, lol...

Just for different ways of thinking how to use things.

Re: Patterns

<ur38ea$1ccf$20@gallifrey.nk.ca>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=786&group=sci.crypt#786

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.nk.ca!.POSTED.doctor.nl2k.ab.ca!not-for-mail
From: doctor@doctor.nl2k.ab.ca (The Doctor)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 22:17:47 -0000 (UTC)
Organization: NetKnow News
Message-ID: <ur38ea$1ccf$20@gallifrey.nk.ca>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me> <ur374g$2n32c$1@dont-email.me>
Injection-Date: Tue, 20 Feb 2024 22:17:47 -0000 (UTC)
Injection-Info: gallifrey.nk.ca; posting-host="doctor.nl2k.ab.ca:204.209.81.1";
logging-data="45455"; mail-complaints-to="usenet@gallifrey.nk.ca"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: doctor@doctor.nl2k.ab.ca (The Doctor)
 by: The Doctor - Tue, 20 Feb 2024 22:17 UTC

In article <ur374g$2n32c$1@dont-email.me>,
Richard Harnden <nospam.harnden@invalid.com> wrote:
>On 20/02/2024 21:09, Chris M. Thomasson wrote:
>> On 2/15/2024 11:02 AM, Stefan Claas wrote:
>>> Chris M. Thomasson wrote:
>>>
>>>> On 2/13/2024 8:45 PM, Rich wrote:
>>>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>>>> wrote:
>>>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>>>> Deos anyone how what encryption is being used here?
>>>>>>>
>>>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>>>
>>>>>> None? lol. just kidding. Humm...
>>>>>>
>>>>>> Some combination of plaintext, secret key and cipher algorithm
>>>>>> generated it.  Probably, the plaintext was hand crafted?  ;^)
>>>>>
>>>>> As Jacob correctly pointed out, if one knows the message, one can
>>>>> then 'hand craft' a one-time-pad to generate exactly this output
>>>>> from that message.
>>>>
>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>> Alice), they can create a special plaintext that generates this
>>>> output for fun.
>>>
>>> How would you do this? I mean the OP IMHO does not show an encrypted
>>> string, done with an OTP. OTPs nature is that it does not include
>>> patterns and is totally random.
>>
>> If Bob and Alice have access to the same OPT, one of them can create a
>> special plaintext that can give the message in the ciphertext, or
>> whatever... Think about it... ;^)
>>
>
>If the ciphertext is just going to be 123...abc..., then there is no
>point in transmitting it.
>
>
>

Basically a generic code!
--
Member - Liberal International This is doctor@nk.ca Ici doctor@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ; unsubscribe from Google Groups to be seen
What worth the power of law that won't stop lawlessness? -unknown

Re: Patterns

<ur38ek$2ncis$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=787&group=sci.crypt#787

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 14:17:55 -0800
Organization: A noiseless patient Spider
Lines: 54
Message-ID: <ur38ek$2ncis$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur374g$2n32c$1@dont-email.me> <ur3899$2nciu$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 20 Feb 2024 22:17:56 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="179eda77360736dadd068492fcb3f96b";
logging-data="2863708"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+/Vru6qNwsaeO2gNy9zBRQUbzC5iePQgw="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:mIym+31goc8zTUIwLeCfFjt3qfo=
Content-Language: en-US
In-Reply-To: <ur3899$2nciu$1@dont-email.me>
 by: Chris M. Thomasson - Tue, 20 Feb 2024 22:17 UTC

On 2/20/2024 2:15 PM, Chris M. Thomasson wrote:
> On 2/20/2024 1:55 PM, Richard Harnden wrote:
>> On 20/02/2024 21:09, Chris M. Thomasson wrote:
>>> On 2/15/2024 11:02 AM, Stefan Claas wrote:
>>>> Chris M. Thomasson wrote:
>>>>
>>>>> On 2/13/2024 8:45 PM, Rich wrote:
>>>>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>>>>> wrote:
>>>>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>>>>> Deos anyone how what encryption is being used here?
>>>>>>>>
>>>>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>>>>
>>>>>>> None? lol. just kidding. Humm...
>>>>>>>
>>>>>>> Some combination of plaintext, secret key and cipher algorithm
>>>>>>> generated it.  Probably, the plaintext was hand crafted?  ;^)
>>>>>>
>>>>>> As Jacob correctly pointed out, if one knows the message, one can
>>>>>> then 'hand craft' a one-time-pad to generate exactly this output
>>>>>> from that message.
>>>>>
>>>>> Or even the other way around? If one knows the OTP (Bob and/or
>>>>> Alice), they can create a special plaintext that generates this
>>>>> output for fun.
>>>>
>>>> How would you do this? I mean the OP IMHO does not show an encrypted
>>>> string, done with an OTP. OTPs nature is that it does not include
>>>> patterns and is totally random.
>>>
>>> If Bob and Alice have access to the same OPT, one of them can create
>>> a special plaintext that can give the message in the ciphertext, or
>>> whatever... Think about it... ;^)
>>>
>>
>> If the ciphertext is just going to be 123...abc..., then there is no
>> point in transmitting it.
>>
>>
>>
>
> Thing of using sections of a large OPT to get:
>
> ciphertext: 123456789
>
> plaintext: thefoxrun
>
> Of source, alice is in on the fun. She says 123456789, lol...
>
> Just for different ways of thinking how to use things.

One can encrypt a message in binary while eating soup. The spoons and
the number of times it uses the spoon can encrypt. ;^)

Re: Patterns

<ur3dlm$2ob56$2@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=788&group=sci.crypt#788

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!news.chmurka.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: unruh@invalid.ca (William Unruh)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Tue, 20 Feb 2024 23:47:02 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 56
Message-ID: <ur3dlm$2ob56$2@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
Injection-Date: Tue, 20 Feb 2024 23:47:02 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="2e2b124d898a68bed9470a9df6514537";
logging-data="2895014"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18AGhey5rJ9i5Bv+fU4jx6x"
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:2dQcVFWaOC0SUQa9glWUsk82V5U=
 by: William Unruh - Tue, 20 Feb 2024 23:47 UTC

On 2024-02-20, Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
> On 2/15/2024 11:02 AM, Stefan Claas wrote:
>> Chris M. Thomasson wrote:
>>
>>> On 2/13/2024 8:45 PM, Rich wrote:
>>>> In sci.crypt Chris M. Thomasson <chris.m.thomasson.1@gmail.com>
>>>> wrote:
>>>>> On 2/12/2024 5:30 PM, The Doctor wrote:
>>>>>> Deos anyone how what encryption is being used here?
>>>>>>
>>>>>> *1234567890ABCDEF01234567890ABCDEF0123456
>>>>>
>>>>> None? lol. just kidding. Humm...
>>>>>
>>>>> Some combination of plaintext, secret key and cipher algorithm
>>>>> generated it. Probably, the plaintext was hand crafted? ;^)
>>>>
>>>> As Jacob correctly pointed out, if one knows the message, one can
>>>> then 'hand craft' a one-time-pad to generate exactly this output
>>>> from that message.
>>>
>>> Or even the other way around? If one knows the OTP (Bob and/or
>>> Alice), they can create a special plaintext that generates this
>>> output for fun.
>>
>> How would you do this? I mean the OP IMHO does not show an encrypted
>> string, done with an OTP. OTPs nature is that it does not include
>> patterns and is totally random.
>
> If Bob and Alice have access to the same OPT, one of them can create a
> special plaintext that can give the message in the ciphertext, or
> whatever... Think about it... ;^)

Yes, Just do the inverse of the OTP (if it is just xor then xor is also
the inverst) and run it over the encrypted text and get what would have
to have beenused to generate that encrypted text. But one of the
absolutely critical things about OTPs is that it should be irremediably
destroyed after it is used to encrypt the message. So only the person
who ha not already used the OTP should have the OTP.

>
>
>>
>> Even if this string is not encrypted and only encoded, how would one
>> get such pattern from plain text and convert it back to plain text?

OTP xor PlainText=EncryptedText
OTP xor EncryptedText=PlainText.

>>
>> It had been best if the OP had posted a reference URL ...
>>
>> Regards
>> Stefan
>

Re: Patterns

<ur5f4g$3emdb$1@i2pn2.org>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=792&group=sci.crypt#792

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!.POSTED!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Wed, 21 Feb 2024 19:24:16 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <ur5f4g$3emdb$1@i2pn2.org>
References: <uqegno$2j5g$1@gallifrey.nk.ca>
<uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me>
<uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org>
<ur34f6$2mh1p$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 21 Feb 2024 18:24:16 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="3627435"; mail-complaints-to="usenet@i2pn2.org";
posting-account="uWi4uQdALkj7ETOfPbhNXfz0+Ra/gM5z6/Fa40dJi9U";
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Ed25519: 43e6681c5cf3cdc2f9ccf975f8a01b18c5e84bf0ba00605faba9cc0f8757a117
X-age: age1yubikey1qdf6fmuk6qqzlzhz69yw5y6eqzhxdkvk3qdcnz77hf8qtqrwpptm5tfyp06
 by: Stefan Claas - Wed, 21 Feb 2024 18:24 UTC

Chris M. Thomasson wrote:

> If Bob and Alice have access to the same OPT, one of them can create
> a special plaintext that can give the message in the ciphertext, or
> whatever... Think about it... ;^)

Can you craft an example, maybe with code (that compiles ...)?

BTW. I would appreciate if you and other sci.crypt regulars
can sign my guestbook, on my Gemini-Capsule.

gemini://tilde.club/~pollux/

The guestbook is under Gästebuch.

I am thinking about to set-up a cryptobook for us in Geminispace,
so that small encrypted messages can be left there ... ;-)

Regards
Stefan
--
----Ed25519 Signature----
d9ebda51717e5bf7c606c460e632d40daa4fa4315574e6aa5b030d60a79654d0
6fa37e28bed2cc9d8ec7ba5d51dd97faa279d0ccc208092802bedc262e88bc0e

Re: Patterns

<ur8oet$5971$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=793&group=sci.crypt#793

  copy link   Newsgroups: comp.security.unix sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: comp.security.unix,sci.crypt
Subject: Re: Patterns
Date: Thu, 22 Feb 2024 16:21:49 -0800
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <ur8oet$5971$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me>
<uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me>
<uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me>
<ur5f4g$3emdb$1@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 23 Feb 2024 00:21:49 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="59f8a5d379a676625decc575bcbd250b";
logging-data="173281"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/aWf7UQu6D4rERVx9VuGnCnqEOrLX4XBI="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:sWW6MH/LsiG9DGj76zhQ264Tz7Y=
In-Reply-To: <ur5f4g$3emdb$1@i2pn2.org>
Content-Language: en-US
 by: Chris M. Thomasson - Fri, 23 Feb 2024 00:21 UTC

On 2/21/2024 10:24 AM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>
>> If Bob and Alice have access to the same OPT, one of them can create
>> a special plaintext that can give the message in the ciphertext, or
>> whatever... Think about it... ;^)
>
> Can you craft an example, maybe with code (that compiles ...)?
>
> BTW. I would appreciate if you and other sci.crypt regulars
> can sign my guestbook, on my Gemini-Capsule.
>
> gemini://tilde.club/~pollux/
>
> The guestbook is under Gästebuch.
>
> I am thinking about to set-up a cryptobook for us in Geminispace,
> so that small encrypted messages can be left there ... ;-)

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=9c113c0799ac3d9b52edbf3429aa673022d46643c5689d93f7cc16688e99961c249bb349a7c6a1c9603ddc793f613cb08a32d3c8284f6dd1a0e9fe3d2cbaf4b32d9717a7be19a1b4934a1e5c5b653ce9213e2acf0cd24a9af41789f9c0bba9fbe2f835a31fe35d90b95514f4d3ad1261e8fc3de2268fec68037bce2dc315ed0668cfd03c78335c171123bc164cca83816da4

Re: Patterns

<ur998d$c6fi$1@dont-email.me>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=794&group=sci.crypt#794

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Patterns
Date: Fri, 23 Feb 2024 05:08:29 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 48
Message-ID: <ur998d$c6fi$1@dont-email.me>
References: <uqegno$2j5g$1@gallifrey.nk.ca> <uqgk8m$28cuj$1@dont-email.me> <uqhgi2$2gjm1$2@dont-email.me> <uqj7eo$2q28i$3@dont-email.me> <uqln3h$2pbms$1@i2pn2.org> <ur34f6$2mh1p$1@dont-email.me> <ur5f4g$3emdb$1@i2pn2.org>
Injection-Date: Fri, 23 Feb 2024 05:08:29 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="2de42414af06e7ded03db8694194233b";
logging-data="399858"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18QDT6m3L7QmY+/kjs1xyEF"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:MCmbV3lHCjcZJymodexrl6jNkZ0=
 by: Rich - Fri, 23 Feb 2024 05:08 UTC

In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
> Chris M. Thomasson wrote:
>
>> If Bob and Alice have access to the same OPT, one of them can create
>> a special plaintext that can give the message in the ciphertext, or
>> whatever... Think about it... ;^)
>
> Can you craft an example, maybe with code (that compiles ...)?

This is not go, but you should be able to follow along well enough.
Note that ^ is Tcl's expr's byte wise XOR operator.:

#!/usr/bin/tclsh

# "OTP" - obtained by running this, then converted to 0x notation by hand:
# dd if=/dev/urandom bs=1 count=2 | xxd
# f1c3

set otp 0xf1c3

# show otp:
puts [format "OTP: %04x" $otp]

# message that Bob should see in the encrypted text
# "feed"

set bob 0xfeed

# create Alice's message, which when 'encrypted' will result in Bob seeing
# "feed" in the encrypted text

set alice [expr {$otp ^ $bob}]

# output Alice's message as a hex string:
puts [format "Alice 'special' message: %04x" $alice]

# encrypt Alice's special message using the OTP:

set ciphertext [expr {$alice ^ $otp}]

# output ciphertext as hex string
puts [format "Ciphertext: %04x" $ciphertext]

Running this results in:

OTP: f1c3
Alice 'special' message: 0f2e
Ciphertext: feed


devel / sci.crypt / Patterns

Pages:12
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor