首页
社区
课程
招聘
[讨论]有听说旋转明文密码的吗?
发表于: 2010-12-29 12:55 6609

[讨论]有听说旋转明文密码的吗?

2010-12-29 12:55
6609
看了丹布朗的《数字堡垒》

旋转明文密码的英文怎么译?

[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

收藏
免费 0
支持
分享
最新回复 (3)
雪    币: 433
活跃值: (45)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
2
跑书店专门翻了英文版,是rotating-cleartext ,发现英文版星际争霸五本和DABLO8本,魔獣7本,每本都66块

GOOGLE。COM:
http://www.instructables.com/id/Vigenere-cipher-with-rotating-cleartext/

Dan Brown - Digital Fortress book
Andre Amorim decouk at gmail.com
Wed Jan 14 17:12:07 CET 2009

Previous message: Dan Brown - Digital Fortress book
Next message: Dan Brown - Digital Fortress book
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

--------------------------------------------------------------------------------

>concept of rotating-cleartext ever existed.[1]
>Charly Avital

Thanks Charly Avital for explanations.
I know, I'd had read his others books firstly... and yes... I read
like Dan as who is reading comics books, no worrys.

The thing that really catch my attention was the concept of
rotating-cleartext thing.

But I think the book is good in the sense that it's encourage those
who are not expert in the subject to know more about. Thats why I'm
here asking.

[s]
-AA

2009/1/14 Charly Avital <shavital at mac.com>:
> Andre Amorim wrote the following on 1/14/09 9:49 AM:
>> Hi all,
>>
>> Anyone knows what's is fact (real) and what is fiction in Dan Brown
>> novel, Digital Fortress ?
>>
>> Kind Regards,
>> [s]
>
>
> I read it years ago. I believe it's the worst book ever written by Dan
> Brown.
>
> Some excerpts from: <http://en.wikipedia.org/wiki/Digital_Fortress>. I
> believe the following list of Mr. Brown's errors (or delusions) is not
> exclusive, to say the least.
>
> Still, it's my opinion, only.
>
> Charly
>
> ----------
> "Although the book's website cites reviews lauding Digital Fortress for
> being extremely realistic, the book contains a number of technical
> errors and misunderstandings in computers, math and technology.
>
>    * Brown mentions a Hungarian mathematician, Josef Harne, who in 1987
> proposed an encryption algorithm that, in addition to encrypting,
> shifted decrypted cleartext over a time variant. However, neither Harne
> nor the concept of rotating-cleartext ever existed.[1]
>    * Brown says the atomic bomb dropped on Nagasaki was fueled by the
> uranium isotope U-238. The Fat Man bomb dropped on Nagasaki was fueled
> by plutonium 239, and U-238 is not an easily fissionable isotope of
> uranium (needing a fusion reaction to initiate fission in the U-238).
>    * Brown also inaccurately portrays the leadership of the NSA. As
> part of the Department of Defense, the NSA director - by law - must be a
> three-star Lieutenant General or Vice Admiral.
>    * Brown confuses bits with bytes, describing a 64bit string as
> containing 64 alphanumeric characters. In fact it would be just 8
> assuming the most basic 8bit character encoding, each character being a
> byte or 8 bits.
>    * Brown suggests that TRANSLTR, a machine capable of breaking a
> 64bit key in 10 minutes would take just an hour to break a 10,000 bit
> key. This is a gross misunderstanding of the relationship between key
> lengths and the time required to brute force them. Such a machine would
> take over 80,000 years to break a 96-bit key and over 350,000 billion
> years (nearly 30,000 times the current age of the universe) to break a
> 128-bit key. The number of years it would take to break a 10,000 bit key
> isn't even practical to write down - it has 2,987 digits.
>    * Brown repeatedly confuses storage or processing of data with
> execution. For example, TRANSLTR is threatened because it has tried to
> crack Digital Fortress, which is actually a virus, and the database is
> similarly threatened because Digital Fortress is sent to it by TRANSLTR.
> Databases and password crackers do not execute the information presented
> to them, so it wouldn't matter that Digital Fortress contains harmful
> instructions.
>    * Characters who are supposedly experts in cryptography seem to
> think there is no such thing as an unbreakable encryption scheme. See
> one-time pad."
> ----------
>

--
Andre Amorim
GnuPG KEY ID: 0x587B1970
FingerPrint:  42AE C929 4D91 4591 4E75 430F 78D9 53B4 587B 1970
Download: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x587B1970

--------------------------------------------------------------------------------

Previous message: Dan Brown - Digital Fortress book
Next message: Dan Brown - Digital Fortress book
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]

--------------------------------------------------------------------------------
More information about the Gnupg-users mailing list
2011-1-11 18:12
0
雪    币: 433
活跃值: (45)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
3
群论的反演?

For the method I'll be using here, the cleartext should be a square number of letters. For example, one flew over the cuckoo's nest

To prevent the cipher from being too easy to crack, you need to change the cleartext in a reversible manner. My method, rotating it, involves writing the cleartext in columns and then reading it in a spiral. Once done, you can add a random letter at every prime numbered space, or some other pattern that's easy to remember and hard to crack.

In this example I started from the middle of the left side, and reversed direction for the second loop of the spiral

Choose keyword
The most important thing to remember is that the keyword is the security of your message. if you choose one that's too short, it can be cracked extremely easily. However, if you choose one that's too long relative to the cleartext, it can get dicey. Usually a keyword of  6-10 letters is decent. For the sake of the demonstration I'll use abcdefghi as the keyword

Rotating Cleartext
Flaw 1: the rotating cleartext algorithm. There is no such thing. There is an addition to the Vigenère cipher which is called "autokey" and uses the cleartext to expand the key instead of repeating the key. As soon as the key is exhausted it appends the cleartext. But it's breakable too.

If you haven't shared the cleartext in advance, you can tack it on the end of the coded message, but for that you have to hide it. you could do the same thing you did with the cleartext in step 2. Give to a friend who knows the protocol and you're finished

http://lucumr.pocoo.org/2007/4/19/digital-fortress-stranger-than-fiction/
上传的附件:
2011-1-11 18:18
0
雪    币: 433
活跃值: (45)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
4
竖着排one flew over the cuckoo's nest ,要5步,

原来已被破解了
2011-1-11 18:29
0
游客
登录 | 注册 方可回帖
返回
//