JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials...

Have a question or want to start a discussion? Post it! No Registration Necessary.  Now with pictures!

Threaded View

Since some readers of this group may have interests in encryptions,
I am taking the liberty to post herewith a link to my encryption scheme
JADE, which is a block cipher of novel unconventional design, written
in Python and with very extensive explaining comments such that any user
(with minimal reading knowledge of Python syntax) can easily understand
the design and evaluate it himself for ascertening the appropriateness
of its use in his applications and be sure, from the open source, that
there  are no backdoors involved (in contrast to using proprietary
blackbox software). The current version 1.4 of JADE is accessible at:
http://s13.zetaboards.com/Crypto/index/ For comments, suggestions and
critiques (also via email) I should be very grateful.

M. K. Shen

Re: JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials mod 2**n
@news.albasani.net:

Quoted text here. Click to load it

Not as good as my encyption scheme.

Brian
--
http://www.skywise711.com - Lasers, Seismology, Astronomy, Skepticism
Sed quis custodiet ipsos Custodes?

Re: JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials mod 2**n
Am 13.09.2012 01:17, schrieb Skywise:

Quoted text here. Click to load it

Share your knowledge with others for the benefit of all
common people.

M. K. Shen



Re: JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials mod 2**n
@news.albasani.net:

Quoted text here. Click to load it

One-time pad using true random number sequences. The only
encryption method mathematically proven to be unbreakable.

Brian
--
http://www.skywise711.com - Lasers, Seismology, Astronomy, Skepticism
Sed quis custodiet ipsos Custodes?

Re: JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials mod 2**n
Am 13.09.2012 20:00, schrieb Skywise:
Quoted text here. Click to load it

"Do" do that, if you "can" generate such and conveniently transport it
to the partner and both of you can safely keep it till the moment of
use and destroy it afterwards.

M. K. Shen


Re: JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials mod 2**n
@news.albasani.net:

Quoted text here. Click to load it

Every encryption method has it's pro's and con's.

Brian
--
http://www.skywise711.com - Lasers, Seismology, Astronomy, Skepticism
Sed quis custodiet ipsos Custodes?

Re: JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials mod 2**n
Am 14.09.2012 05:15, schrieb Skywise:
Quoted text here. Click to load it

That's true not only in encryption but also in all aspects of the life
(in this unfortunately non-perfect world).

M. K. Shen


Site Timeline