Posts: 28
Threads: 1
Joined: Jun 2006
Quote:What is vignere?
Vigenere is an old or "classic" form of encryption usen in older times....
try to see:
http://en.wikipedia.org/wiki/Vigenere_table
I'm quite interested in encryption and cryptoanalysis so i do some research about them...
aith without action is dead.
Life becomes easier if things are done well than being said.
Posts: 421
Threads: 22
Joined: Oct 2005
Quote:I'm quite interested in encryption and cryptoanalysis so i do some research about them...
Me too. I was going to write a report on how the Allies cracked the Enigma machine for school, but I never got around to it.
In the beginning, there is darkness â the emptiness of a matrix waiting for the light. Then a single photon flares into existence. Then another. Soon, thousands more. Optronic pathways connect, subroutines emerge from the chaos, and a holographic consciousness is born." -The Doctor
Posts: 544
Threads: 27
Joined: Jan 2005
Polter:
I went to the link you posted, regarding the "Vigenere table". I found it very interesting! The analysis presented there amazed me! Some folk are simply very imaginative and analytic, all at the same time. I wonder, if you take a text, encrypt it using a password, then take that encrypted text and submit it to a new encryption password and encryption, would the resultant text still be susceptible to analysis? If so, is there any number of repeats of this that will result in an undecryptable text?
Ralph, using QuickBASIC 4.5 and Windows XP Home Edition and Service Pack 2, with HP LaserJet 4L printer.
Posts: 28
Threads: 1
Joined: Jun 2006
Quote:Polter:
I went to the link you posted, regarding the "Vigenere table". I found it very interesting! The analysis presented there amazed me! Some folk are simply very imaginative and analytic, all at the same time. I wonder, if you take a text, encrypt it using a password, then take that encrypted text and submit it to a new encryption password and encryption, would the resultant text still be susceptible to analysis? If so, is there any number of repeats of this that will result in an undecryptable text?
If you use a very strong encryption... Actually, the scurity of your encryption depends upon the security of your password(e.g. not telling it to anyone nor giving any idea of what it is), the content of the text, and both the length of the text and password(password is quite longer than the text is better, and there is a way to do it)
There is an alogarithms which is so called one-time pad...
see this link:
http://en.wikipedia.org/wiki/One-time_pad
i'm still trying to make an alorithm for this one....
aith without action is dead.
Life becomes easier if things are done well than being said.
Posts: 544
Threads: 27
Joined: Jan 2005
Encryption gets more interesting as one reads more! Would you post you English description of the steps to take to create the encrypted message, as well as to decrypt it? Then, someone may furnish an algorthm for you. I know that I would try...
Ralph, using QuickBASIC 4.5 and Windows XP Home Edition and Service Pack 2, with HP LaserJet 4L printer.
Posts: 28
Threads: 1
Joined: Jun 2006
Gee, thanks, I'd never expect...
I planned to compile some info and resources about encryption and/or cryptography and put them on my currently "Empty" site.... It's really empty so, i'll just put up a link on some other side resources....
But somehow, you can see some at wikipedia:
http://en.wikipedia.org/wiki/Cryptography
Just ask me about some details that are quite hard to ponder about...
aith without action is dead.
Life becomes easier if things are done well than being said.
Posts: 28
Threads: 1
Joined: Jun 2006
Quote:Encryption gets more interesting as one reads more! Would you post you English description of the steps to take to create the encrypted message, as well as to decrypt it? Then, someone may furnish an algorthm for you. I know that I would try...
Gee, Thanks, I've never expected....
Quote:Then, someone may furnish an algorthm for you. I know that I would try.
But I somehow disagree to your statement. It is not for me, it is for eveyone who is interested about cryptography, like you and me and any other users here who got interest. I want to share what I have and I want that evryone who wnat got his own share...
Again, It's not for me, I for ALL OF US...
I've got little or no time to post an info regarding cryptography/encryption/encipherment but you can see some info
on wikipedia:
http://en.wikipedia.org/wiki/Cryptography
I know the site quite lacks some info, so you could post some questions regarding other topics....
aith without action is dead.
Life becomes easier if things are done well than being said.
Posts: 544
Threads: 27
Joined: Jan 2005
Thanks again for posting your links. I read them all, and learned enough to stay put!
Ralph, using QuickBASIC 4.5 and Windows XP Home Edition and Service Pack 2, with HP LaserJet 4L printer.
Posts: 28
Threads: 1
Joined: Jun 2006
Quote:Thanks again for posting your links. I read them all, and learned enough to stay put!
I'll still continue to post my codes and projects, so you can have ideas about other projects....
I'll be gonna making an alogrithm for a more secure encryption, like combining the alogrithms of other types...
I'll also try to make the code for enciphering text in files...
aith without action is dead.
Life becomes easier if things are done well than being said.
Posts: 684
Threads: 64
Joined: May 2004
Hehe, well I thought I'd go on moneo's post earlier with the XOR thing. Please don't think I'm taking over your topic, I thought this was enough on topic to post...
Code: Dim plaintxt As String
Dim pass As Integer
Dim xorchar As Integer
Dim encrypted As String
Dim ciphered As String
Input "Text to encrypt: ", plaintxt
Input "Password (numeric): ", pass
Randomize pass
For i = 1 To Len(plaintxt)
xorchar = Int(Rnd(1) * 255 + 1)
encrypted += chr$(asc(mid$(plaintxt,i,1)) xor pass)
Next i
Print encrypted
'Try unencrypting
Input "Text to cipher: ", encrypted
Input "Password (numeric): ", pass
Randomize pass
For i = 1 To Len(encrypted)
xorchar = Int(Rnd(1) * 255 + 1)
ciphered += chr$(asc(mid$(encrypted, i, 1)) xor pass)
Next i
Print ciphered
sleep
Just made the pass a bit different. Be careful what kind of password you choose, it can be quite difficult to cipher. I don't know if this made it any more difficult to cipher or not.
quote="Deleter"]judging gameplay, you can adaquately compare quake 4 with pong[/quote]
|