• Content Count

  • Joined

  • Last visited

  • Days Won


GirkovArpa last won the day on September 18 2018

GirkovArpa had the most liked content!

Community Reputation

2 Neutral

About GirkovArpa

  • Rank
    Active Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. This is threshold encryption. You say it's different but don't specify how. Threshold encryption is a very much studied field.
  2. Alice and Bob post at random intervals inside a thread on an anonymous message board The thread of posts is interpreted as a string of bits Posts by Alice represent a 1 Posts by Bob represent a 0 The security of this key in bits is the length of the thread in posts, minus 1 So 100 posts make for 99-bit security Alice and Bob are the only ones who know the key, even though the posts which comprise it are hosted publically. All Eve sees when she browses their thread is a series of blank posts made by anonymous users. She knows what Alice and Bob are doing, but
  3. Here is a Javascript implementation of the NEW version of the Hutton Cipher. The original version had the problem where the password should not contain the letter Z because otherwise, the ciphertext would periodically contain plaintext letters. But if you don't have Z in the password, plaintext letters will NEVER encrypt to themselves, and you end up with the same problem ENIGMA had. The new rule in Hutton v2 is instead of just counting to the right as many spaces as dictated by the base26 value of the key letter, you sum that value with the base26 value of whatever letter happen
  4. Here is a video illustrating how it works.
  5. If you use multiple keys whose lengths are relatively prime, your effective Vigenere key length is the product of the lengths of all the keys. Imagine using keys with relatively prime lengths 9, 10, and 11. Your effective key length would be 1,320 characters long! Using an easily-remembered phrase that you can break up until lengths of perhaps 29, 30, and 31, you're practically using a one-time pad 26,970 letters long that you can store in your head! Is there any way to crack such a ciphertext if it's shorter than the effective key length?
  6. Someone calling themselves Hutton invented a new pen-and-paper cipher that seems to be incredibly secure. He offered a reward of over $1,000 to anyone who could crack it, although he disappeared from the internet a month ago so I'm not sure if the challenge is still ongoing. Anyway, here is how it works. You come up with a scrambled alphabet and a key. Write your key repeatedly under your plaintext just like Vigenere. To encrypt the first plaintext letter, find it in the scrambled alphabet. Count to the right (wrapping if you reach the end) as many letters as the number which your ke