Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v6cclq$3veiq$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v6cclq$3veiq$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: HMAC cipher and a TRNG...
Date: Sat, 6 Jul 2024 14:24:10 -0700
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <v6cclq$3veiq$1@dont-email.me>
References: <v69m0j$3e2id$1@dont-email.me> <v69vjv$3fu1v$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 06 Jul 2024 23:24:10 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="dc2c633286188c32c212ea5809bbeb3f";
	logging-data="4176474"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19C6czVQBmmMUFw5vBxGwg+I0BUDsJAuFA="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:HnzZbPZp7G8LdLaDFexVHldFEak=
In-Reply-To: <v69vjv$3fu1v$1@dont-email.me>
Content-Language: en-US
Bytes: 1529

On 7/5/2024 4:29 PM, colin wrote:
>> Here is an example of my HMAC Cipher example. You should all be able 
>> to examine the plaintext because it was encrypted using the default 
>> key. Now, keep in mind, that if I encrypted this again, it would have 
>> a different ciphertext. 
> Security 101 - don't reuse passwords

:^) Indeed. However, creating radically different ciphertexts for the 
same plaintext and password on a per-encryption bases is interesting to 
me... Humm...