Deutsch English Français Italiano |
<v6eqj8$f608$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: HMAC cipher and a TRNG... Date: Sun, 7 Jul 2024 12:33:59 -0700 Organization: A noiseless patient Spider Lines: 35 Message-ID: <v6eqj8$f608$1@dont-email.me> References: <v69m0j$3e2id$1@dont-email.me> <v69vjv$3fu1v$1@dont-email.me> <v6cclq$3veiq$1@dont-email.me> <v6cemu$3vkt2$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sun, 07 Jul 2024 21:34:01 +0200 (CEST) Injection-Info: dont-email.me; posting-host="0ecdb18ed35c2abf38d5c9c78345642e"; logging-data="497672"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/99YC5TtdfZdpnY5AfTzu4yYW41JI6uCA=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:LMbF+ANky1+I3ZwgOipBn/3JvCQ= Content-Language: en-US In-Reply-To: <v6cemu$3vkt2$1@dont-email.me> Bytes: 2523 On 7/6/2024 2:58 PM, colin wrote: > On 7/07/24 09:24, Chris M. Thomasson wrote: >> On 7/5/2024 4:29 PM, colin wrote: >>>> Here is an example of my HMAC Cipher example. You should all be able >>>> to examine the plaintext because it was encrypted using the default >>>> key. Now, keep in mind, that if I encrypted this again, it would >>>> have a different ciphertext. >>> Security 101 - don't reuse passwords >> >> :^) Indeed. However, creating radically different ciphertexts for the >> same plaintext and password on a per-encryption bases is interesting >> to me... Humm... > > Your advertising campaign seems to to be pushing this fact as a selling > point. Selling point, what do you mean? This is an experiment! It would be fun if somebody could bust it wide open. Where they don't need a damn password, the ciphertext is all they need. That would be fun to learn about. Advertising campaign as in I need it to be properly examined before it can be used at all. Forever experimental it shall be. :^) > quote - > "Fwiw, it creates new ciphertexts for every encryption even with the > same password and/or plaintext." > > Where your encryption is only as strong as a compromised reused > password. ( ie: pointless ) A compromised secret password is bad. I was just interested if I could create different ciphertexts for the same plaintext and password, as an experiment. See?