Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v6ftof$od4m$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v6ftof$od4m$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!3.eu.feeder.erje.net!feeder.erje.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: HMAC cipher and a TRNG...
Date: Sun, 7 Jul 2024 22:34:06 -0700
Organization: A noiseless patient Spider
Lines: 28
Message-ID: <v6ftof$od4m$1@dont-email.me>
References: <v69m0j$3e2id$1@dont-email.me> <v69vjv$3fu1v$1@dont-email.me>
 <v6cclq$3veiq$1@dont-email.me> <v6cemu$3vkt2$1@dont-email.me>
 <v6eqj8$f608$1@dont-email.me> <v6flab$n028$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 08 Jul 2024 07:34:07 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="d261bcbd6346c8c1e41bc57b2f9d4cc7";
	logging-data="799894"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/baRb1DD8JQkgbZICc/JW7pycVl0y4ZJ8="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:nq1KOzBGFfEV9zSq3pSM04Srf6Y=
In-Reply-To: <v6flab$n028$1@dont-email.me>
Content-Language: en-US
Bytes: 2222

On 7/7/2024 8:10 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> A compromised secret password is bad.  I was just interested if I
>> could create different ciphertexts for the same plaintext and
>> password, as an experiment.  See?
> 
> Slightly revisionist history.
> 
> IIRC you were worried about having all bits of the plaintext change if
> any one bit of the ciphertext was changed by Eve.
> 
> Because if all you were worried about was different ciphertexts from
> same key and plaintext, that is already available from standard
> constructions.  Note this short example:
[...]

> Same key, same plaintext, two different ciphertexts.

Both. I wanted each encryption using the same key and plaintext to 
create radically different ciphertexts.

Also, I wanted it to be bit sensitive. If a single bit of ciphertext is 
altered it will decrypt to random junk.

My HMAC Cipher experiment does both.

I think those are interesting things.