Public Key Cryptography: Secrecy in Public - Professor Raymond Flood

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

So much complicated stuff presented in a single lecture in such a simple manner, wow. Wonderful!

hyiux
Автор

also a system is to predesign a date change of parts of encryption so sender and receiver knwo that before - that is NOT the key but part of the coding system,
and of course it changes when you meet for example each 3 months

VeilerDark
Автор

please make also a linguistic lecture - non rhotic idea[r]s - german origin vs nordic vs frech origin words/ why we call many greek words like chaos latin? we know that the oldest haver "wins" the origin etc.

the hard core verson of it is [r]idea[r]  naughty roaring british lion

most extra [r]s are mady by the speaker 95%
but 5% happen inside an english speakers brain while listening


who decoded the message?

Alice or Bob?

I  dear!

VeilerDark
Автор

the huge message strategy is a stategy mathematicians hate
because produces huge texts, it was a 1970s approach

you parallel each symbol to a billion various texts [for each symbol]

in three month you meet face to face the programmer and
you change the various long parallelisms

---

you never repeat the same text to make a pattern,
before the loop starts to appear, the three months are passed
and you simply changed encoding

---

it cannot be encripted,
it produces huge texts, but there is no problem with modern technology


it even has been tested by presidents.

it is not a very sexy method, but based on ancient maths,

mathematicians hate it, because it does not include
real cryptography

presidents love it,

pesidents need a method that can never produces a single loop,
ok the messages are huge, but modern communication is very fast.

mathematicians are egoists,

they want to make things delicate

security officers serve the president before science

well - if someone is paid, or if someone can see your codes,

it simply opens it,

this is not deciphering but code stealing

that is the huge problem if you are clever enough to make a fine encoding




your key [before the three months] reshapes
the parallel texts for the letter here - not the original texts

VeilerDark
Автор

well the professor was bullshiting us
the modern Caesar Cipher
uses all posible parallelisms of the alphabet,
so the original letters do not parallelize
with the same order of the alpabet simply shifted,

but all posible combinations,


we use a code that means nothing except
the Multiple Caesar Chipher Series we want,

and inside the same message we change many times
Chiphering,

also we use Variant codes for the same letter

for example a=twf=afafffa=eew

so we distort patterns,

our key is for example 3-4-2-5

and that means we used

variant systems 3-4-2-5 at pre designed fragmentations,


so we must predesign our letter length

also the place that texts chance encoding.

we can add random letters to fill the gaps.


we also have to meet in person with the main computer,

to redesing new parallelisms of letters - [each three months, but we do it face to face with the programmer and we are both nude in an empty white room - scanned for not having anal microphones]



even if we do so, this is a very primitive system


---

we MUST use it,

but with quantum encription and other techniques



if you encript the encripted message with few variant systems

you make it safer.

imagine an asshole decifers your moden encription system

and stucks in your secondary modern Caesar Cipher system,

you may laugh now, but if the guy is late

4 hours more, your army may have slain already a dictator


most encriptions break for other reasons

than pure talent on decription,

so you must send if you use multiple encription to different mediums

not in your name but in fake profiles,

so if one opens one, he cannot find the other.


Caesar Chiper works better if you do that


for example your a = adadks = aasdsdwe = aswddasadasde =rufasfdf

so various sizes - various options - so you have less patterns,


that leads to various texts, but not always if well designed,

and we know that silly texts are not the original,

it also produces huge texts to send - but we have the technonogy

this is not a modern way to encript

but it must be used secondarilly and the codes

be sent from another system to another system

so if someone payes one of our officers at one post,

he statistically does not have paid the other one on the other post,


you and the sender must use different methods to send the various mutliple codes,

otherwise the same guy that gets paid, helps Eve to fuck you nicely

and well done will be, because we seperate risks

VeilerDark
Автор

It seems to me you're trying to make it too complex. Take two identical dictionaries give every defined word a number than use a system with say! with 10, 000 or 10, 000, 000 single individual digit. Give every number or word its own individual digit after that your options are almost endless.

marvindyer
Автор

mathematicians love encoding methods that allow
"solutions"

high iq presidents do not give a fuck about what mathematicians want


the NO LOOP systems - systems that NEVER produce

a singe repetition of parallelism at the first encoding level,

and at the second encoding level of course,

they encrypt with other modern cryptography methods

----

why to encrypt a message that has no loops?

because security officers get paid by the enemy

- we use separate officers and separate communication

for separate encoding layers

- separate means separate sets of senders/receivers

if we use two encryptions with two senders
and one receiving apparatus/ then we do NOT have
two enrcyptions, but one doublelayer enrcyption,

some people uderstand that when they have already lost

a lot of data

VeilerDark