On 20/02/17 07:38,
austin...@hotmail.com wrote:
<snip>
>
> At the present time only the hypothesis exists. I have said there is
> a lot of work to do before I write the cipher and am ready to give
> you a step-by-step demonstration but that will come I can assure
> you.
>
> Also, without a very good understanding of plane geometry and vetor
> arithmetic of a fairly advanced level no reader will be able to
> understand any step-by-step demonstration. It is all on my website
> for you to see but it is not easy to comprehend.
>
> This isn't meant to be patronising just a fact of life.
Okay, so let's list the features so far:
1) no implementation currently exists;
2) the author doesn't currently understand how to decrypt the encrypted
file;
3) even if the author ever does work out how to decrypt, he thinks only
those with advanced mathematical ability will ever be able to follow his
reasoning;
4) when an implementation eventually does exist (if ever), Alice will
have to download and install an Ada compiler, modify the source code to
change the key, recompile, and run the program within the specific Ada
IDE used by the original author. She will then have to phone Bob up to
tell him what changes to make to /his/ source code, so that /he/ can
re-compile /his/ copy, and this all has to happen before she can encrypt
her first file;
5) when it eventually exists, the program will be able to process data
at a fraction of the speed of existing cryptosytems, in keeping with the
author's idea that the modern world is too fast and needs slowing down a
little;
5) it will be able to encrypt /any/ data at all, provided the data only
incorporates octets in the range 32-127, any other data being dropped
silently, thus destroying photographs, videos, sound clips,
word-processed documents, spreadsheets, PDFs, or any other kind of data
other than raw, returnless, tabless ASCII (which rules out HTML and
LaTeX, too, of course);
6) arbitrary corruption during transmission is, on past form, very
likely to occur;
7) the author has at some point in the recent past claimed that a
polyalphabetic substitution cipher of his own devising is
information-theoretically secure (and it was cracked wide open shortly
afterwards);
8) the author has a track record of refusing to answer or even to try to
understand technical questions about his work;
9) the author's Web site is badly designed, with no information actually
on display - to read anything he's posted there, one has to download his
stuff and then unzip it, which one might do once but surely wouldn't do
twice.
As I look at the above feature list, Austin, I have to say that there's
one thing that puzzles me: why the hell isn't the world beating a path
to your door?