Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v6eqj8$f608$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v6eqj8$f608$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: HMAC cipher and a TRNG...
Date: Sun, 7 Jul 2024 12:33:59 -0700
Organization: A noiseless patient Spider
Lines: 35
Message-ID: <v6eqj8$f608$1@dont-email.me>
References: <v69m0j$3e2id$1@dont-email.me> <v69vjv$3fu1v$1@dont-email.me>
 <v6cclq$3veiq$1@dont-email.me> <v6cemu$3vkt2$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 07 Jul 2024 21:34:01 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="0ecdb18ed35c2abf38d5c9c78345642e";
	logging-data="497672"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/99YC5TtdfZdpnY5AfTzu4yYW41JI6uCA="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:LMbF+ANky1+I3ZwgOipBn/3JvCQ=
Content-Language: en-US
In-Reply-To: <v6cemu$3vkt2$1@dont-email.me>
Bytes: 2523

On 7/6/2024 2:58 PM, colin wrote:
> On 7/07/24 09:24, Chris M. Thomasson wrote:
>> On 7/5/2024 4:29 PM, colin wrote:
>>>> Here is an example of my HMAC Cipher example. You should all be able 
>>>> to examine the plaintext because it was encrypted using the default 
>>>> key. Now, keep in mind, that if I encrypted this again, it would 
>>>> have a different ciphertext. 
>>> Security 101 - don't reuse passwords
>>
>> :^) Indeed. However, creating radically different ciphertexts for the 
>> same plaintext and password on a per-encryption bases is interesting 
>> to me... Humm...
> 
> Your advertising campaign seems to to be pushing this fact as a selling 
> point.

Selling point, what do you mean? This is an experiment! It would be fun 
if somebody could bust it wide open. Where they don't need a damn 
password, the ciphertext is all they need. That would be fun to learn 
about. Advertising campaign as in I need it to be properly examined 
before it can be used at all. Forever experimental it shall be.

:^)


> quote -
> "Fwiw, it creates new ciphertexts for every encryption even with the 
> same password and/or plaintext."
> 
> Where your encryption is only as strong as a compromised reused 
> password. ( ie: pointless )

A compromised secret password is bad. I was just interested if I could 
create different ciphertexts for the same plaintext and password, as an 
experiment. See?