Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Q: Why did the programmer call his mother long distance? A: Because that was her name.


sci / sci.crypt / Re: Ternary Encoding :-)

SubjectAuthor
* Ternary Encoding :-)Stefan Claas
+* Re: Ternary Encoding :-)Stefan Claas
|`* Re: Ternary Encoding :-)Rich
| +* Re: Ternary Encoding :-)Stefan Claas
| |+* Re: Ternary Encoding :-)Stefan Claas
| ||+- Re: Ternary Encoding :-)Stefan Claas
| ||`* Re: Ternary Encoding :-)Rich
| || `- Re: Ternary Encoding :-)Chris M. Thomasson
| |`- Re: Ternary Encoding :-)Rich
| `* Re: Ternary Encoding :-)Stefan Claas
|  `* Re: Ternary Encoding :-)Rich
|   `* Re: Ternary Encoding :-)Stefan Claas
|    `* Re: Ternary Encoding :-)Rich
|     `* Re: Ternary Encoding :-)Stefan Claas
|      +* Re: Ternary Encoding :-)Stefan Claas
|      |`* Re: Ternary Encoding :-)Rich
|      | `* Re: Ternary Encoding :-)Stefan Claas
|      |  `- Re: Ternary Encoding :-)Rich
|      `* Re: Ternary Encoding :-)Rich
|       `* Re: Ternary Encoding :-)Stefan Claas
|        `* Re: Ternary Encoding :-)Stefan Claas
|         +- Re: Ternary Encoding :-)Rich
|         `* Re: Ternary Encoding :-)Rich
|          +- Re: Ternary Encoding :-)Stefan Claas
|          `* Re: Ternary Encoding :-)Chax Plore
|           `- Re: Ternary Encoding :-)Rich
`* Re: Ternary Encoding :-)Chris M. Thomasson
 `* Re: Ternary Encoding :-)Stefan Claas
  `* Re: Ternary Encoding :-)Chris M. Thomasson
   `* xorpng (was: Ternary Encoding :-))Stefan Claas
    +- Re: xorpngStefan Claas
    `* Re: xorpngChris M. Thomasson
     `* Re: xorpngStefan Claas
      `* Re: xorpngChris M. Thomasson
       `* Re: xorpngChris M. Thomasson
        `* Re: xorpngStefan Claas
         `* Re: xorpngChris M. Thomasson
          `* Re: xorpngStefan Claas
           +* Re: xorpngChris M. Thomasson
           |`* Re: xorpngStefan Claas
           | `* Re: xorpngRich
           |  `* Re: xorpngStefan Claas
           |   +* Re: xorpngChris M. Thomasson
           |   |`* Re: xorpngStefan Claas
           |   | `* Re: xorpngChris M. Thomasson
           |   |  +- Re: xorpngChris M. Thomasson
           |   |  `* Re: xorpngStefan Claas
           |   |   `* Re: xorpngChris M. Thomasson
           |   |    `* Re: xorpngStefan Claas
           |   |     `- Re: xorpngChris M. Thomasson
           |   `* Re: xorpngRich
           |    `* Re: xorpngStefan Claas
           |     +* Re: xorpngStefan Claas
           |     |`* Re: xorpngRich
           |     | `* Re: xorpngStefan Claas
           |     |  `* Re: xorpngRich
           |     |   `* Re: xorpngStefan Claas
           |     |    +* Re: xorpngChris M. Thomasson
           |     |    |`* Re: xorpngChris M. Thomasson
           |     |    | `* Re: xorpngStefan Claas
           |     |    |  +* Re: xorpngChris M. Thomasson
           |     |    |  |`- Re: xorpngChris M. Thomasson
           |     |    |  +* Re: xorpngChris M. Thomasson
           |     |    |  |`* Re: xorpngStefan Claas
           |     |    |  | `* Re: xorpngStefan Claas
           |     |    |  |  `- Re: xorpngStefan Claas
           |     |    |  `* Re: xorpngRich
           |     |    |   `* Re: xorpngStefan Claas
           |     |    |    +* Re: xorpngStefan Claas
           |     |    |    |+* Re: xorpngStefan Claas
           |     |    |    ||`* Re: xorpngJan Panteltje
           |     |    |    || `- Re: xorpngStefan Claas
           |     |    |    |`- Re: xorpngRich
           |     |    |    `* Re: xorpngRich
           |     |    |     `* Re: xorpngStefan Claas
           |     |    |      `* Re: xorpngStefan Claas
           |     |    |       `* Re: xorpngStefan Claas
           |     |    |        `* Re: xorpngStefan Claas
           |     |    |         `* Re: xorpngChris M. Thomasson
           |     |    |          +- Re: xorpngChris M. Thomasson
           |     |    |          `* Re: xorpngStefan Claas
           |     |    |           `- Re: xorpngChris M. Thomasson
           |     |    `- Re: xorpngRich
           |     +- Re: xorpngRich
           |     `* Re: xorpngChris M. Thomasson
           |      +* Re: xorpngChris M. Thomasson
           |      |`* Re: xorpngStefan Claas
           |      | +* Re: xorpngChris M. Thomasson
           |      | |`- Re: xorpngRich
           |      | `- Re: xorpngChris M. Thomasson
           |      `- Re: xorpngRich
           `* Re: xorpngChris M. Thomasson
            +* Re: xorpngChris M. Thomasson
            |`- Re: xorpngStefan Claas
            `* Re: xorpngStefan Claas
             `* Re: xorpngStefan Claas
              `* Re: xorpngChris M. Thomasson
               `* Re: xorpngStefan Claas
                `- Re: xorpngChris M. Thomasson

Pages:1234
Subject: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Wed, 1 Jan 2025 01:00 UTC
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 02:00:36 +0100
Organization: To protect and to server
Message-ID: <vl243l$3jkpe$1@paganini.bofh.team>
Mime-Version: 1.0
Injection-Date: Wed, 1 Jan 2025 01:00:37 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="3789614"; posting-host="6lqOwJyxRLkv94k9QBgAmg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:fm1Az70mvkcoy6sS8vzvLWjqZss=
X-Notice: Filtered by postfilter v. 0.9.3
X-Date: It's Wed Sep 11446 02:00:36 AM CET 1993, the September that never ends.
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Ed25519-Sig: ec892326304e97d1849d6dfc02f03cb84bca147f14da37ce5377477692ba99b9
fc030631b5067cf43a4cc8eb1cfe9f4c97ef8910742b7b277a52c070037af107
View all headers

echo 'Happy News Year 2025' | ternary
2112102022020111101010222211010022112012102120110020100021120220
10000111010121200020221000211000220022020

$ echo 'Happy News Year 2025' | ternary | ternary -d
Happy News Year 2025

(My program works with binary data as well.)

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Wed, 1 Jan 2025 16:24 UTC
References: 1
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 17:24:30 +0100
Organization: To protect and to server
Message-ID: <vl3q7v$3mbq0$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team>
Mime-Version: 1.0
Injection-Date: Wed, 1 Jan 2025 16:24:31 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="3878720"; posting-host="FXYPbVklqRQUWzmYeEVmDg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:izOKUutX1Vc5vzQW4YJpZVdwujg=
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Sig: 2e661d1e14207cb507c195ec2ef2c359674e64480d50c271c0971f5c3de1068c
9ce84a74373e41f568b3e481f6c18d1a459565353f79e76d601981926f1d1709
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Date: It's Wed Sep 11446 05:24:30 PM CET 1993, the September that never ends.
View all headers

Stefan Claas wrote:
>
> echo 'Happy News Year 2025' | ternary
> 2112102022020111101010222211010022112012102120110020100021120220
> 10000111010121200020221000211000220022020
>
> $ echo 'Happy News Year 2025' | ternary | ternary -d
> Happy News Year 2025
>
> (My program works with binary data as well.)
>

The nice thing is we can like xor use ternary exclusive or (txor)
to encrypt/decrypt messages. :-)

$ echo 'Happy News Year 2025' | ternary > message.txt
$ txor -k k-1.txt < message.txt > message_encrypted.txt
$ txor -k k-1.txt -d < message_encrypted.txt > message_decrypted.txt
$ ternary -d < message_decrypted.txt
Happy News Year 2025

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 1 Jan 2025 18:24 UTC
References: 1 2
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 18:24:10 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 31
Message-ID: <vl418a$2sv2k$1@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team>
Injection-Date: Wed, 01 Jan 2025 19:24:11 +0100 (CET)
Injection-Info: dont-email.me; posting-host="8c10bf53f7fd2c88970ece96e6e64bf0";
logging-data="3046484"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/mzePn5rugy2jLQOpMwfzn"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:RSykGGUsxYQsjzRX2EovvySVuXo=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Stefan Claas wrote:
>>
>> echo 'Happy News Year 2025' | ternary
>> 2112102022020111101010222211010022112012102120110020100021120220
>> 10000111010121200020221000211000220022020
>>
>> $ echo 'Happy News Year 2025' | ternary | ternary -d
>> Happy News Year 2025
>>
>> (My program works with binary data as well.)
>>
>
> The nice thing is we can like xor use ternary exclusive or (txor)
> to encrypt/decrypt messages. :-)
>
> $ echo 'Happy News Year 2025' | ternary > message.txt
> $ txor -k k-1.txt < message.txt > message_encrypted.txt
> $ txor -k k-1.txt -d < message_encrypted.txt > message_decrypted.txt
> $ ternary -d < message_decrypted.txt
> Happy News Year 2025

How does "ternary exclusive or" differ from the usual boolean xor?

Provided one can "xor" binary data, there's zero need for any odd
'encoding specific' xor operation. Just do a binary xor and be done.

Of course, this just brings to the front the OTP key distribution and
key reuse problems.

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Wed, 1 Jan 2025 19:25 UTC
References: 1 2 3
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 20:25:34 +0100
Organization: To protect and to server
Message-ID: <vl44rf$3mt70$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Wed, 1 Jan 2025 19:25:35 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="3896544"; posting-host="FXYPbVklqRQUWzmYeEVmDg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:qGP45sqNdPxAXjFrNwpn2PE+sm0=
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Sig: ca0ab864c7dd1ea9a08b3a6bebed398284d45301225e0c3d7b0ef485aef9109c
d7aa042f5134257f9247d332bc2a6cfee8b927fa0b446bf1383d560b11969307
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Date: It's Wed Sep 11446 08:25:34 PM CET 1993, the September that never ends.
View all headers

Rich wrote:
> Stefan Claas <pollux@tilde.club> wrote:
> > Stefan Claas wrote:
> > >
> > > echo 'Happy News Year 2025' | ternary
> > > 2112102022020111101010222211010022112012102120110020100021120220
> > > 10000111010121200020221000211000220022020
> > >
> > > $ echo 'Happy News Year 2025' | ternary | ternary -d
> > > Happy News Year 2025
> > >
> > > (My program works with binary data as well.)
> > >
> >
> > The nice thing is we can like xor use ternary exclusive or (txor)
> > to encrypt/decrypt messages. :-)
> >
> > $ echo 'Happy News Year 2025' | ternary > message.txt
> > $ txor -k k-1.txt < message.txt > message_encrypted.txt
> > $ txor -k k-1.txt -d < message_encrypted.txt > message_decrypted.txt
> > $ ternary -d < message_decrypted.txt
> > Happy News Year 2025
>
> How does "ternary exclusive or" differ from the usual boolean xor?

The usual Boolean XOR (exclusive or) operation takes two binary inputs
and returns true (1) if exactly one of the inputs is true (1), and false
(0) otherwise.

Ternary XOR takes three binary inputs and returns true (1) if an odd
number of the inputs are true (1).

The ternary XOR differs from the usual XOR in that it considers three
inputs instead of two and returns true when an odd number of these
inputs are true.

> Provided one can "xor" binary data, there's zero need for any odd
> 'encoding specific' xor operation. Just do a binary xor and be done.

I wanted to visualize with the numbers 0,1,2 the Ternary numbers,
in an encoding scheme for ASCII transmission of the payload and that
the output can be compared with:

https://calculator.name/baseconvert/hexadecimal/ternary/
> Of course, this just brings to the front the OTP key distribution and
> key reuse problems.

Use it locally with your best friends. :-)

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Wed, 1 Jan 2025 19:48 UTC
References: 1 2 3 4
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 20:48:30 +0100
Organization: To protect and to server
Message-ID: <vl466f$3mt70$3@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl44rf$3mt70$1@paganini.bofh.team>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 1 Jan 2025 19:48:31 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="3896544"; posting-host="FXYPbVklqRQUWzmYeEVmDg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:1JdSbkkxYTCxRfviPjElvSyFbqk=
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Date: It's Wed Sep 11446 08:48:30 PM CET 1993, the September that never ends.
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Sig: 78d078a18abb95921a39830d092904dba7ec8b16ace26aae0fe53b413a09cd3a
fcdb70cac4f178e189f78907aee12d44ffd933731782f148b6537bb62ff2410e
View all headers

Stefan Claas wrote:
> Rich wrote:
> > Stefan Claas <pollux@tilde.club> wrote:
> > > Stefan Claas wrote:
> > > >
> > > > echo 'Happy News Year 2025' | ternary
> > > > 2112102022020111101010222211010022112012102120110020100021120220
> > > > 10000111010121200020221000211000220022020
> > > >
> > > > $ echo 'Happy News Year 2025' | ternary | ternary -d
> > > > Happy News Year 2025
> > > >
> > > > (My program works with binary data as well.)
> > > >
> > >
> > > The nice thing is we can like xor use ternary exclusive or (txor)
> > > to encrypt/decrypt messages. :-)
> > >
> > > $ echo 'Happy News Year 2025' | ternary > message.txt
> > > $ txor -k k-1.txt < message.txt > message_encrypted.txt
> > > $ txor -k k-1.txt -d < message_encrypted.txt > message_decrypted.txt
> > > $ ternary -d < message_decrypted.txt
> > > Happy News Year 2025
> >
> > How does "ternary exclusive or" differ from the usual boolean xor?
>
> The usual Boolean XOR (exclusive or) operation takes two binary inputs
> and returns true (1) if exactly one of the inputs is true (1), and false
> (0) otherwise.
>
> Ternary XOR takes three binary inputs and returns true (1) if an odd
> number of the inputs are true (1).

XOR:

A B A⊕B
0 0 0
0 1 1
1 0 1
1 1 0

Ternary XOR:

A B C A⊕B⊕C
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 0
1 1 0 0
1 1 1 1

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Wed, 1 Jan 2025 20:04 UTC
References: 1 2 3 4 5
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 21:04:08 +0100
Organization: To protect and to server
Message-ID: <vl4749$3n1ra$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl44rf$3mt70$1@paganini.bofh.team> <vl466f$3mt70$3@paganini.bofh.team>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 1 Jan 2025 20:04:25 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="3901290"; posting-host="FXYPbVklqRQUWzmYeEVmDg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:vus4isXxTu0Hu2RHeZPBFHz1frk=
X-Date: It's Wed Sep 11446 09:04:08 PM CET 1993, the September that never ends.
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Ed25519-Sig: 426711d418e689db7ad122dfb97b38ba2c4a4cc6fd4ba3968ecdc9b8d6015336
a9c9746630de9effdbf9c1a2c0dc7289e2fc7518aaa584872764c9c54fe49a03
View all headers

Stefan Claas wrote:
> Stefan Claas wrote:
> > Rich wrote:
> > > Stefan Claas <pollux@tilde.club> wrote:
> > > > Stefan Claas wrote:
> > > > >
> > > > > echo 'Happy News Year 2025' | ternary
> > > > > 2112102022020111101010222211010022112012102120110020100021120220
> > > > > 10000111010121200020221000211000220022020
> > > > >
> > > > > $ echo 'Happy News Year 2025' | ternary | ternary -d
> > > > > Happy News Year 2025
> > > > >
> > > > > (My program works with binary data as well.)
> > > > >
> > > >
> > > > The nice thing is we can like xor use ternary exclusive or (txor)
> > > > to encrypt/decrypt messages. :-)
> > > >
> > > > $ echo 'Happy News Year 2025' | ternary > message.txt
> > > > $ txor -k k-1.txt < message.txt > message_encrypted.txt
> > > > $ txor -k k-1.txt -d < message_encrypted.txt > message_decrypted.txt
> > > > $ ternary -d < message_decrypted.txt
> > > > Happy News Year 2025
> > >
> > > How does "ternary exclusive or" differ from the usual boolean xor?
> >
> > The usual Boolean XOR (exclusive or) operation takes two binary inputs
> > and returns true (1) if exactly one of the inputs is true (1), and false
> > (0) otherwise.
> >
> > Ternary XOR takes three binary inputs and returns true (1) if an odd
> > number of the inputs are true (1).
>
> XOR:
>
> A B A⊕B
> 0 0 0
> 0 1 1
> 1 0 1
> 1 1 0
>
> Ternary XOR:
>
> A B C A⊕B⊕C
> 0 0 0 0
> 0 0 1 1
> 0 1 0 1
> 0 1 1 0
> 1 0 0 1
> 1 0 1 0
> 1 1 0 0
> 1 1 1 1

$ echo -n 'Hello sci.crypt!' > message.txt

$ ternary < message.txt
1221201211220001100200101212212002212101111121202210002002121022
1111101022101001

$ xxd -ps < message.txt
48656c6c6f207363692e637279707421

<https://www.webconversiononline.com/number-conversion.aspx?number=48656c6c6f207363692e637279707421&from=hexadecimal&to=ternary>

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Wed, 1 Jan 2025 22:12 UTC
References: 1 2 3
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 23:12:56 +0100
Organization: To protect and to server
Message-ID: <vl4el9$3ndf1$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Wed, 1 Jan 2025 22:12:57 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="3913185"; posting-host="FXYPbVklqRQUWzmYeEVmDg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:SYoQ9b+uN04AvB0Wj6FocZAep7I=
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Date: It's Wed Sep 11446 11:12:56 PM CET 1993, the September that never ends.
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Sig: fc1bbba96e8760887003f13ac25c4814a22d2eb1339c1418d11ba45e78895a13
fc673a93ed12c52cc53779cf8f59a96bcb43dfbe1a70a835986bb6d70b8af000
View all headers

Rich wrote:

> Of course, this just brings to the front the OTP key distribution and
> key reuse problems.

Forgot to mention, not with my programs, because also in this case I
can use for ternary xor encryption deterministic keys, valid for one
day (UTC +0000), so that border control does not find keys. :-)

I have made this a standard for some of my programs, because long ago
I thought of key distribution problems and looked for solutions, which
others afaik have not thought of (yet).

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 1 Jan 2025 22:16 UTC
References: 1 2 3 4
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 22:16:51 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 13
Message-ID: <vl4esj$2vav0$1@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl44rf$3mt70$1@paganini.bofh.team>
Injection-Date: Wed, 01 Jan 2025 23:16:51 +0100 (CET)
Injection-Info: dont-email.me; posting-host="8c10bf53f7fd2c88970ece96e6e64bf0";
logging-data="3124192"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/XrSA+GiPfBtNkjNvkNPxn"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:DsdF/9eVuKPO7uwKnUSIetcZUdo=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
>> Of course, this just brings to the front the OTP key distribution
>> and key reuse problems.
>
> Use it locally with your best friends. :-)

You still have a "distribution" problem, in that each "key file" must
be used only once. So you still have to get fresh pads to your
friends.

You've reduced the scale from "getting OTPs behind enemy lines" to
"getting OTPs to friends". But it still exists.

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 1 Jan 2025 22:19 UTC
References: 1 2 3 4 5
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 22:19:13 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 57
Message-ID: <vl4f11$2vav0$2@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl44rf$3mt70$1@paganini.bofh.team> <vl466f$3mt70$3@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 01 Jan 2025 23:19:15 +0100 (CET)
Injection-Info: dont-email.me; posting-host="8c10bf53f7fd2c88970ece96e6e64bf0";
logging-data="3124192"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/lEz6+4hHXbJy1TiYu1od9"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:UuQ8WwfXnPBeKYQ5LhnF9ZqFoX4=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Stefan Claas wrote:
>> Rich wrote:
>> > Stefan Claas <pollux@tilde.club> wrote:
>> > > Stefan Claas wrote:
>> > > >
>> > > > echo 'Happy News Year 2025' | ternary
>> > > > 2112102022020111101010222211010022112012102120110020100021120220
>> > > > 10000111010121200020221000211000220022020
>> > > >
>> > > > $ echo 'Happy News Year 2025' | ternary | ternary -d
>> > > > Happy News Year 2025
>> > > >
>> > > > (My program works with binary data as well.)
>> > > >
>> > >
>> > > The nice thing is we can like xor use ternary exclusive or (txor)
>> > > to encrypt/decrypt messages. :-)
>> > >
>> > > $ echo 'Happy News Year 2025' | ternary > message.txt
>> > > $ txor -k k-1.txt < message.txt > message_encrypted.txt
>> > > $ txor -k k-1.txt -d < message_encrypted.txt > message_decrypted.txt
>> > > $ ternary -d < message_decrypted.txt
>> > > Happy News Year 2025
>> >
>> > How does "ternary exclusive or" differ from the usual boolean xor?
>>
>> The usual Boolean XOR (exclusive or) operation takes two binary inputs
>> and returns true (1) if exactly one of the inputs is true (1), and false
>> (0) otherwise.
>>
>> Ternary XOR takes three binary inputs and returns true (1) if an odd
>> number of the inputs are true (1).
>
> XOR:
>
> A B A⊕B
> 0 0 0
> 0 1 1
> 1 0 1
> 1 1 0
>
> Ternary XOR:
>
> A B C A⊕B⊕C
> 0 0 0 0
> 0 0 1 1
> 0 1 0 1
> 0 1 1 0
> 1 0 0 1
> 1 0 1 0
> 1 1 0 0
> 1 1 1 1

Or simply "even parity".

https://en.wikipedia.org/wiki/Parity_bit

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 1 Jan 2025 22:20 UTC
References: 1 2 3 4
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Wed, 1 Jan 2025 22:20:32 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <vl4f3g$2vav0$3@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team>
Injection-Date: Wed, 01 Jan 2025 23:20:32 +0100 (CET)
Injection-Info: dont-email.me; posting-host="8c10bf53f7fd2c88970ece96e6e64bf0";
logging-data="3124192"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+pcBgSiGcTp+/LJWeTiQB/"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:BzdR4iE42XDSDDN1JfszRaEnlKc=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
>
>> Of course, this just brings to the front the OTP key distribution and
>> key reuse problems.
>
> Forgot to mention, not with my programs, because also in this case I
> can use for ternary xor encryption deterministic keys, valid for one
> day (UTC +0000), so that border control does not find keys. :-)

You'll have to explain further, as the above is not nearly enough
explanation to understand what you are discussing.

> I have made this a standard for some of my programs, because long ago
> I thought of key distribution problems and looked for solutions,
> which others afaik have not thought of (yet).

Further explanation needed.

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Thu, 2 Jan 2025 00:28 UTC
References: 1 2 3 4 5
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Thu, 2 Jan 2025 01:28:30 +0100
Organization: To protect and to server
Message-ID: <vl4mjv$3sqb1$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me>
Mime-Version: 1.0
Injection-Date: Thu, 2 Jan 2025 00:28:47 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="4090209"; posting-host="FXYPbVklqRQUWzmYeEVmDg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:4nXfNRTwHXMIWmi6Y9BHIL0ipM4=
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Ed25519-Sig: f70992b8447366691fe45e654ccb9c183aaa85ab42d85c387f913b7846ea7401
f7fc78c17e7867b5290a75a08947f83e61018125afb0ebdcada105495106fe08
X-Date: It's Thu Sep 11447 01:28:30 AM CET 1993, the September that never ends.
X-Notice: Filtered by postfilter v. 0.9.3
View all headers

Rich wrote:
> Stefan Claas <pollux@tilde.club> wrote:
> > Rich wrote:
> >
> > > Of course, this just brings to the front the OTP key distribution and
> > > key reuse problems.
> >
> > Forgot to mention, not with my programs, because also in this case I
> > can use for ternary xor encryption deterministic keys, valid for one
> > day (UTC +0000), so that border control does not find keys. :-)
>
> You'll have to explain further, as the above is not nearly enough
> explanation to understand what you are discussing.
>
> > I have made this a standard for some of my programs, because long ago
> > I thought of key distribution problems and looked for solutions,
> > which others afaik have not thought of (yet).
>
> Further explanation needed.

Ok. You talked about key distribution problems with OTPs and management.

I have Go programs which can generate as many random keys/pads per day
(UTC +0000) for my programs, based on a shared secret, consisting of
a password and salt.

In order that this works Alice and Bob needs only one initial session,
where they transfer with a client/server program, which uses DHE/AES-GCM,
the shared secret via the Tor Network, to bypass third party servers
and NAT etc.

Once the shared secret is transfered securely to Alice or Bob, they use
the key generation programs, which are deterministic. This means that
when Alice generates todays pads/keys she does not need to transfer them
to Bob, because Bob has the shared secret and can generate the same
determenistic keys for each day (UTC +0000).

This procedure allows either Alice or Bob to travel, without worring that
some border patrol finds pads/keys, for daily usage, or If I would do
encryption with you without sending you pads in advance, via postal
service etc.

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Thu, 2 Jan 2025 04:31 UTC
References: 1 2 3 4 5 6
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Thu, 2 Jan 2025 04:31:11 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 54
Message-ID: <vl54qf$36b5p$1@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team>
Injection-Date: Thu, 02 Jan 2025 05:31:12 +0100 (CET)
Injection-Info: dont-email.me; posting-host="6420596632e4571cd84179c8b721a5c9";
logging-data="3353785"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19Aq0XFbNMgPf2DQ0ydifz9"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:NuOdxnmOzpiZ/Yi8b432PkHTnOw=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
>> Stefan Claas <pollux@tilde.club> wrote:
>> > Rich wrote:
>> >
>> > > Of course, this just brings to the front the OTP key distribution and
>> > > key reuse problems.
>> >
>> > Forgot to mention, not with my programs, because also in this case I
>> > can use for ternary xor encryption deterministic keys, valid for one
>> > day (UTC +0000), so that border control does not find keys. :-)
>>
>> You'll have to explain further, as the above is not nearly enough
>> explanation to understand what you are discussing.
>>
>> > I have made this a standard for some of my programs, because long ago
>> > I thought of key distribution problems and looked for solutions,
>> > which others afaik have not thought of (yet).
>>
>> Further explanation needed.
>
> Ok. You talked about key distribution problems with OTPs and management.
>
> I have Go programs which can generate as many random keys/pads per day
> (UTC +0000) for my programs, based on a shared secret, consisting of
> a password and salt.
>
> In order that this works Alice and Bob needs only one initial session,
> where they transfer with a client/server program, which uses DHE/AES-GCM,
> the shared secret via the Tor Network, to bypass third party servers
> and NAT etc.
>
> Once the shared secret is transfered securely to Alice or Bob, they use
> the key generation programs, which are deterministic. This means that
> when Alice generates todays pads/keys she does not need to transfer them
> to Bob, because Bob has the shared secret and can generate the same
> determenistic keys for each day (UTC +0000).
>
> This procedure allows either Alice or Bob to travel, without worring that
> some border patrol finds pads/keys, for daily usage, or If I would do
> encryption with you without sending you pads in advance, via postal
> service etc.

Then the weakness here is this "generator algorithm". A OTP is only
perfectly secure if the pads are true random sequences.

Deterministic outputs from a seeded generator are not "true random
sequences" so you will not gain the "unbreakable" aspect of a proper
OTP.

Will it likely be /good enough/ such that those of us left here are
unlikely to break it: yes. Will it be good enough that one of the
three-letter-agencies cannot break it: likely no.

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Thu, 2 Jan 2025 14:18 UTC
References: 1 2 3 4 5 6 7
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Thu, 2 Jan 2025 15:18:05 +0100
Organization: To protect and to server
Message-ID: <vl6770$3v5qv$2@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Thu, 2 Jan 2025 14:18:08 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="4167519"; posting-host="WyaToOEEsx2UzvHb61/7Ew.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:x/7mjvxh8eIGjhiRbUImGxPmqZs=
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Sig: 620b0fb35a635445edf70e5a1cee3a00f1348ba5d818508e30213f3e442d17de
6804f61c69a262f95b6ca32bf547b17a146c1b3f47cb49196ce5ef54d43a900c
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Date: It's Thu Sep 11447 03:18:05 PM CET 1993, the September that never ends.
View all headers

Rich wrote:
> Stefan Claas <pollux@tilde.club> wrote:
> > Rich wrote:
> > > Stefan Claas <pollux@tilde.club> wrote:
> > > > Rich wrote:
> > > >
> > > > > Of course, this just brings to the front the OTP key distribution and
> > > > > key reuse problems.
> > > >
> > > > Forgot to mention, not with my programs, because also in this case I
> > > > can use for ternary xor encryption deterministic keys, valid for one
> > > > day (UTC +0000), so that border control does not find keys. :-)
> > >
> > > You'll have to explain further, as the above is not nearly enough
> > > explanation to understand what you are discussing.
> > >
> > > > I have made this a standard for some of my programs, because long ago
> > > > I thought of key distribution problems and looked for solutions,
> > > > which others afaik have not thought of (yet).
> > >
> > > Further explanation needed.
> >
> > Ok. You talked about key distribution problems with OTPs and management.
> >
> > I have Go programs which can generate as many random keys/pads per day
> > (UTC +0000) for my programs, based on a shared secret, consisting of
> > a password and salt.
> >
> > In order that this works Alice and Bob needs only one initial session,
> > where they transfer with a client/server program, which uses DHE/AES-GCM,
> > the shared secret via the Tor Network, to bypass third party servers
> > and NAT etc.
> >
> > Once the shared secret is transfered securely to Alice or Bob, they use
> > the key generation programs, which are deterministic. This means that
> > when Alice generates todays pads/keys she does not need to transfer them
> > to Bob, because Bob has the shared secret and can generate the same
> > determenistic keys for each day (UTC +0000).
> >
> > This procedure allows either Alice or Bob to travel, without worring that
> > some border patrol finds pads/keys, for daily usage, or If I would do
> > encryption with you without sending you pads in advance, via postal
> > service etc.
>
> Then the weakness here is this "generator algorithm". A OTP is only
> perfectly secure if the pads are true random sequences.
>
> Deterministic outputs from a seeded generator are not "true random
> sequences" so you will not gain the "unbreakable" aspect of a proper
> OTP.
>
> Will it likely be /good enough/ such that those of us left here are
> unlikely to break it: yes. Will it be good enough that one of the
> three-letter-agencies cannot break it: likely no.
>

That is old saying , that it is only unbreakable with TRRNG. I believe
that nowadays PRNG can serve the purpose as well, for OTP encryption.

What patterns would distinguish a TRNG and PRNG OTP sheet, if a
cryptanalist would look at them, or when looking at a couple of
more sheets? The difference is IMHO none.

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Thu, 2 Jan 2025 15:02 UTC
References: 1 2 3 4 5 6 7 8
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Thu, 2 Jan 2025 16:02:38 +0100
Organization: To protect and to server
Message-ID: <vl69r0$3vb75$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team>
Mime-Version: 1.0
Injection-Date: Thu, 2 Jan 2025 15:02:56 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="4173029"; posting-host="WyaToOEEsx2UzvHb61/7Ew.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:+XZ4YM1s5k+yydHR3rGabNHJCKY=
X-Date: It's Thu Sep 11447 04:02:38 PM CET 1993, the September that never ends.
X-Ed25519-Sig: 5903d6b331550d24ec72ba8fb631b4d19f42c89ac1311e04696a4ad8f554a20d
808753cddfff3d3488d53a35d2276843ed14197d31cc0159f2aaba66b53e8505
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
View all headers

Stefan Claas wrote:
> Rich wrote:
> > Stefan Claas <pollux@tilde.club> wrote:
> > > Rich wrote:
> > > > Stefan Claas <pollux@tilde.club> wrote:
> > > > > Rich wrote:
> > > > >
> > > > > > Of course, this just brings to the front the OTP key distribution and
> > > > > > key reuse problems.
> > > > >
> > > > > Forgot to mention, not with my programs, because also in this case I
> > > > > can use for ternary xor encryption deterministic keys, valid for one
> > > > > day (UTC +0000), so that border control does not find keys. :-)
> > > >
> > > > You'll have to explain further, as the above is not nearly enough
> > > > explanation to understand what you are discussing.
> > > >
> > > > > I have made this a standard for some of my programs, because long ago
> > > > > I thought of key distribution problems and looked for solutions,
> > > > > which others afaik have not thought of (yet).
> > > >
> > > > Further explanation needed.
> > >
> > > Ok. You talked about key distribution problems with OTPs and management.
> > >
> > > I have Go programs which can generate as many random keys/pads per day
> > > (UTC +0000) for my programs, based on a shared secret, consisting of
> > > a password and salt.
> > >
> > > In order that this works Alice and Bob needs only one initial session,
> > > where they transfer with a client/server program, which uses DHE/AES-GCM,
> > > the shared secret via the Tor Network, to bypass third party servers
> > > and NAT etc.
> > >
> > > Once the shared secret is transfered securely to Alice or Bob, they use
> > > the key generation programs, which are deterministic. This means that
> > > when Alice generates todays pads/keys she does not need to transfer them
> > > to Bob, because Bob has the shared secret and can generate the same
> > > determenistic keys for each day (UTC +0000).
> > >
> > > This procedure allows either Alice or Bob to travel, without worring that
> > > some border patrol finds pads/keys, for daily usage, or If I would do
> > > encryption with you without sending you pads in advance, via postal
> > > service etc.
> >
> > Then the weakness here is this "generator algorithm". A OTP is only
> > perfectly secure if the pads are true random sequences.
> >
> > Deterministic outputs from a seeded generator are not "true random
> > sequences" so you will not gain the "unbreakable" aspect of a proper
> > OTP.
> >
> > Will it likely be /good enough/ such that those of us left here are
> > unlikely to break it: yes. Will it be good enough that one of the
> > three-letter-agencies cannot break it: likely no.
> >
>
> That is old saying , that it is only unbreakable with TRRNG. I believe
> that nowadays PRNG can serve the purpose as well, for OTP encryption.
>
> What patterns would distinguish a TRNG and PRNG OTP sheet, if a
> cryptanalist would look at them, or when looking at a couple of
> more sheets? The difference is IMHO none.

Example, 60 dice rolls from random.org and Go's crypto/rand

random.org:
2 4 4 4 4 5 4 6 1 2 2 1 5 6 4
5 6 4 2 2 5 3 6 1 3 1 4 1 6 4
2 1 2 2 2 2 2 2 3 1 1 2 6 1 6
5 1 6 5 5 4 3 1 3 6 6 5 1 3 1

Go crypt/rand:
3 5 6 3 4 5 4 1 1 6 1 5 3 2 4
3 5 1 1 6 5 3 2 3 1 1 6 3 3 3
5 3 6 3 1 2 1 6 1 1 4 1 1 5 5
1 6 3 6 6 1 4 6 1 3 2 2 1 4 1

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Thu, 2 Jan 2025 18:25 UTC
References: 1 2 3 4 5 6 7 8
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Thu, 2 Jan 2025 18:25:57 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 75
Message-ID: <vl6lnl$3eumm$1@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team>
Injection-Date: Thu, 02 Jan 2025 19:25:58 +0100 (CET)
Injection-Info: dont-email.me; posting-host="6420596632e4571cd84179c8b721a5c9";
logging-data="3635926"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19xB9TdqIiADTfhWYzRJlfN"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:cdcYWvY+eJXuumgTLRj46LBXI3w=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Rich wrote:
>> Stefan Claas <pollux@tilde.club> wrote:
>> > Rich wrote:
>> > > Stefan Claas <pollux@tilde.club> wrote:
>> > > > Rich wrote:
>> > > >
>> > > > > Of course, this just brings to the front the OTP key distribution and
>> > > > > key reuse problems.
>> > > >
>> > > > Forgot to mention, not with my programs, because also in this case I
>> > > > can use for ternary xor encryption deterministic keys, valid for one
>> > > > day (UTC +0000), so that border control does not find keys. :-)
>> > >
>> > > You'll have to explain further, as the above is not nearly enough
>> > > explanation to understand what you are discussing.
>> > >
>> > > > I have made this a standard for some of my programs, because long ago
>> > > > I thought of key distribution problems and looked for solutions,
>> > > > which others afaik have not thought of (yet).
>> > >
>> > > Further explanation needed.
>> >
>> > Ok. You talked about key distribution problems with OTPs and management.
>> >
>> > I have Go programs which can generate as many random keys/pads per day
>> > (UTC +0000) for my programs, based on a shared secret, consisting of
>> > a password and salt.
>> >
>> > In order that this works Alice and Bob needs only one initial session,
>> > where they transfer with a client/server program, which uses DHE/AES-GCM,
>> > the shared secret via the Tor Network, to bypass third party servers
>> > and NAT etc.
>> >
>> > Once the shared secret is transfered securely to Alice or Bob, they use
>> > the key generation programs, which are deterministic. This means that
>> > when Alice generates todays pads/keys she does not need to transfer them
>> > to Bob, because Bob has the shared secret and can generate the same
>> > determenistic keys for each day (UTC +0000).
>> >
>> > This procedure allows either Alice or Bob to travel, without worring that
>> > some border patrol finds pads/keys, for daily usage, or If I would do
>> > encryption with you without sending you pads in advance, via postal
>> > service etc.
>>
>> Then the weakness here is this "generator algorithm". A OTP is only
>> perfectly secure if the pads are true random sequences.
>>
>> Deterministic outputs from a seeded generator are not "true random
>> sequences" so you will not gain the "unbreakable" aspect of a proper
>> OTP.
>>
>> Will it likely be /good enough/ such that those of us left here are
>> unlikely to break it: yes. Will it be good enough that one of the
>> three-letter-agencies cannot break it: likely no.
>>
>
> That is old saying , that it is only unbreakable with TRRNG. I believe
> that nowadays PRNG can serve the purpose as well, for OTP encryption.

You can believe what you wish. But for your belief to be accepted by
more than yourself you'll need to show a proof of such. Neither of us
being a "cryptographer" I'll continue to believe the existing proofs
that for an OTP to be secure the pad needs to be generated from a true
random source.

> What patterns would distinguish a TRNG and PRNG OTP sheet, if a
> cryptanalist would look at them, or when looking at a couple of
> more sheets? The difference is IMHO none.

Any deterministic generator system (i.e., a PRNG) is going to have some
bias somewhere (possibly not noticable until a significant number of
outputs are analyzed). It will be that bias that will provide the
crack through which an actual cryptographer will break the system.

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Thu, 2 Jan 2025 18:38 UTC
References: 1 2 3 4 5 6 7 8 9
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Thu, 2 Jan 2025 18:38:26 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 110
Message-ID: <vl6mf1$3eumm$2@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl69r0$3vb75$1@paganini.bofh.team>
Injection-Date: Thu, 02 Jan 2025 19:38:26 +0100 (CET)
Injection-Info: dont-email.me; posting-host="6420596632e4571cd84179c8b721a5c9";
logging-data="3635926"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18RjYfcUZFlS7GFegPlez1K"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:YKLiLqgWblWUQnAHXHSIrqCaiYc=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Stefan Claas wrote:
>> Rich wrote:
>> > Stefan Claas <pollux@tilde.club> wrote:
>> > > Rich wrote:
>> > > > Stefan Claas <pollux@tilde.club> wrote:
>> > > > > Rich wrote:
>> > > > >
>> > > > > > Of course, this just brings to the front the OTP key distribution and
>> > > > > > key reuse problems.
>> > > > >
>> > > > > Forgot to mention, not with my programs, because also in this case I
>> > > > > can use for ternary xor encryption deterministic keys, valid for one
>> > > > > day (UTC +0000), so that border control does not find keys. :-)
>> > > >
>> > > > You'll have to explain further, as the above is not nearly enough
>> > > > explanation to understand what you are discussing.
>> > > >
>> > > > > I have made this a standard for some of my programs, because long ago
>> > > > > I thought of key distribution problems and looked for solutions,
>> > > > > which others afaik have not thought of (yet).
>> > > >
>> > > > Further explanation needed.
>> > >
>> > > Ok. You talked about key distribution problems with OTPs and management.
>> > >
>> > > I have Go programs which can generate as many random keys/pads per day
>> > > (UTC +0000) for my programs, based on a shared secret, consisting of
>> > > a password and salt.
>> > >
>> > > In order that this works Alice and Bob needs only one initial session,
>> > > where they transfer with a client/server program, which uses DHE/AES-GCM,
>> > > the shared secret via the Tor Network, to bypass third party servers
>> > > and NAT etc.
>> > >
>> > > Once the shared secret is transfered securely to Alice or Bob, they use
>> > > the key generation programs, which are deterministic. This means that
>> > > when Alice generates todays pads/keys she does not need to transfer them
>> > > to Bob, because Bob has the shared secret and can generate the same
>> > > determenistic keys for each day (UTC +0000).
>> > >
>> > > This procedure allows either Alice or Bob to travel, without worring that
>> > > some border patrol finds pads/keys, for daily usage, or If I would do
>> > > encryption with you without sending you pads in advance, via postal
>> > > service etc.
>> >
>> > Then the weakness here is this "generator algorithm". A OTP is only
>> > perfectly secure if the pads are true random sequences.
>> >
>> > Deterministic outputs from a seeded generator are not "true random
>> > sequences" so you will not gain the "unbreakable" aspect of a proper
>> > OTP.
>> >
>> > Will it likely be /good enough/ such that those of us left here are
>> > unlikely to break it: yes. Will it be good enough that one of the
>> > three-letter-agencies cannot break it: likely no.
>> >
>>
>> That is old saying , that it is only unbreakable with TRRNG. I believe
>> that nowadays PRNG can serve the purpose as well, for OTP encryption.
>>
>> What patterns would distinguish a TRNG and PRNG OTP sheet, if a
>> cryptanalist would look at them, or when looking at a couple of
>> more sheets? The difference is IMHO none.
>
> Example, 60 dice rolls from random.org and Go's crypto/rand
>
> random.org:
> 2 4 4 4 4 5 4 6 1 2 2 1 5 6 4
> 5 6 4 2 2 5 3 6 1 3 1 4 1 6 4
> 2 1 2 2 2 2 2 2 3 1 1 2 6 1 6
> 5 1 6 5 5 4 3 1 3 6 6 5 1 3 1
>
> Go crypt/rand:
> 3 5 6 3 4 5 4 1 1 6 1 5 3 2 4
> 3 5 1 1 6 5 3 2 3 1 1 6 3 3 3
> 5 3 6 3 1 2 1 6 1 1 4 1 1 5 5
> 1 6 3 6 6 1 4 6 1 3 2 2 1 4 1

In just this one sample, go crypt/rand shows a bias (I'm surprised it
showed with such a small sample size). Larger samples will likely show
other biases:

random.org

count die face
13 1
13 2
6 3
10 4
8 5
10 6

go

count die face
18 1
5 2
13 3
6 4
8 5
10 6

go rolled a "1" 18 times (random.org rolled no single face more than 13
times). It also under-rolled a "2" vs. the lowest count face
random.org returned.

And finding that simple bias only needed 'sort' and 'uniq' to do so.
Running them through something like the die harder tests would likely
show other results.

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Thu, 2 Jan 2025 23:25 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 00:25:15 +0100
Organization: To protect and to server
Message-ID: <vl778r$r10$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl69r0$3vb75$1@paganini.bofh.team> <vl6mf1$3eumm$2@dont-email.me>
Mime-Version: 1.0
Injection-Date: Thu, 2 Jan 2025 23:25:15 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="27680"; posting-host="WyaToOEEsx2UzvHb61/7Ew.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:3fhCnpCgjHv6OGrFgWa6rVNfXwU=
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Notice: Filtered by postfilter v. 0.9.3
X-Date: It's Fri Sep 11448 12:25:15 AM CET 1993, the September that never ends.
X-Ed25519-Sig: 67d11a8e4d188c4697770cbd1f331008b47693e6ad4e129fb8a9849cf54a9f5d
d4c36e17169820881a8101ce7a645fb04fd8c2656ec7f9cc24ae7823571a6f00
View all headers

Rich wrote:
> Stefan Claas <pollux@tilde.club> wrote:
> > Stefan Claas wrote:
> > > Rich wrote:
> > > > Stefan Claas <pollux@tilde.club> wrote:
> > > > > Rich wrote:
> > > > > > Stefan Claas <pollux@tilde.club> wrote:
> > > > > > > Rich wrote:
> > > > > > >
> > > > > > > > Of course, this just brings to the front the OTP key distribution and
> > > > > > > > key reuse problems.
> > > > > > >
> > > > > > > Forgot to mention, not with my programs, because also in this case I
> > > > > > > can use for ternary xor encryption deterministic keys, valid for one
> > > > > > > day (UTC +0000), so that border control does not find keys. :-)
> > > > > >
> > > > > > You'll have to explain further, as the above is not nearly enough
> > > > > > explanation to understand what you are discussing.
> > > > > >
> > > > > > > I have made this a standard for some of my programs, because long ago
> > > > > > > I thought of key distribution problems and looked for solutions,
> > > > > > > which others afaik have not thought of (yet).
> > > > > >
> > > > > > Further explanation needed.
> > > > >
> > > > > Ok. You talked about key distribution problems with OTPs and management.
> > > > >
> > > > > I have Go programs which can generate as many random keys/pads per day
> > > > > (UTC +0000) for my programs, based on a shared secret, consisting of
> > > > > a password and salt.
> > > > >
> > > > > In order that this works Alice and Bob needs only one initial session,
> > > > > where they transfer with a client/server program, which uses DHE/AES-GCM,
> > > > > the shared secret via the Tor Network, to bypass third party servers
> > > > > and NAT etc.
> > > > >
> > > > > Once the shared secret is transfered securely to Alice or Bob, they use
> > > > > the key generation programs, which are deterministic. This means that
> > > > > when Alice generates todays pads/keys she does not need to transfer them
> > > > > to Bob, because Bob has the shared secret and can generate the same
> > > > > determenistic keys for each day (UTC +0000).
> > > > >
> > > > > This procedure allows either Alice or Bob to travel, without worring that
> > > > > some border patrol finds pads/keys, for daily usage, or If I would do
> > > > > encryption with you without sending you pads in advance, via postal
> > > > > service etc.
> > > >
> > > > Then the weakness here is this "generator algorithm". A OTP is only
> > > > perfectly secure if the pads are true random sequences.
> > > >
> > > > Deterministic outputs from a seeded generator are not "true random
> > > > sequences" so you will not gain the "unbreakable" aspect of a proper
> > > > OTP.
> > > >
> > > > Will it likely be /good enough/ such that those of us left here are
> > > > unlikely to break it: yes. Will it be good enough that one of the
> > > > three-letter-agencies cannot break it: likely no.
> > > >
> > >
> > > That is old saying , that it is only unbreakable with TRRNG. I believe
> > > that nowadays PRNG can serve the purpose as well, for OTP encryption.
> > >
> > > What patterns would distinguish a TRNG and PRNG OTP sheet, if a
> > > cryptanalist would look at them, or when looking at a couple of
> > > more sheets? The difference is IMHO none.
> >
> > Example, 60 dice rolls from random.org and Go's crypto/rand
> >
> > random.org:
> > 2 4 4 4 4 5 4 6 1 2 2 1 5 6 4
> > 5 6 4 2 2 5 3 6 1 3 1 4 1 6 4
> > 2 1 2 2 2 2 2 2 3 1 1 2 6 1 6
> > 5 1 6 5 5 4 3 1 3 6 6 5 1 3 1
> >
> > Go crypt/rand:
> > 3 5 6 3 4 5 4 1 1 6 1 5 3 2 4
> > 3 5 1 1 6 5 3 2 3 1 1 6 3 3 3
> > 5 3 6 3 1 2 1 6 1 1 4 1 1 5 5
> > 1 6 3 6 6 1 4 6 1 3 2 2 1 4 1
>
> In just this one sample, go crypt/rand shows a bias (I'm surprised it
> showed with such a small sample size). Larger samples will likely show
> other biases:
>
> random.org
>
> count die face
> 13 1
> 13 2
> 6 3
> 10 4
> 8 5
> 10 6
>
> go
>
> count die face
> 18 1
> 5 2
> 13 3
> 6 4
> 8 5
> 10 6
>
> go rolled a "1" 18 times (random.org rolled no single face more than 13
> times). It also under-rolled a "2" vs. the lowest count face
> random.org returned.
>
> And finding that simple bias only needed 'sort' and 'uniq' to do so.
> Running them through something like the die harder tests would likely
> show other results.

Now I have used my PC's internal TRNG (TPM 2.0 Chip) via Go, instead of
crypt/rand and the process is slower but looks like this:

4 4 3 6 3 6 3 4 4 6 4 2 1 5 1
1 5 6 6 1 1 6 3 1 2 5 6 1 2 4
2 4 2 3 5 1 2 6 5 1 2 1 2 5 3
1 4 5 5 6 6 3 5 2 5 5 6 4 2 2

5 3 1 5 2 4 5 4 6 1 1 3 4 5 4
3 2 5 4 4 4 6 3 1 5 6 6 2 6 2
2 4 5 5 5 5 2 6 5 6 3 3 3 1 6
3 3 2 2 3 6 5 3 2 2 1 6 6 4 6

1 4 5 3 4 3 1 6 3 2 1 1 6 3 4
6 5 2 4 3 3 3 5 1 4 2 5 4 3 3
3 4 5 2 5 3 1 4 6 1 6 3 2 5 6
5 4 6 4 6 6 2 4 2 2 6 4 4 1 4

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Thu, 2 Jan 2025 23:29 UTC
References: 1 2 3 4 5 6 7 8 9
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 00:29:33 +0100
Organization: To protect and to server
Message-ID: <vl77gt$r10$2@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl6lnl$3eumm$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Thu, 2 Jan 2025 23:29:34 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="27680"; posting-host="WyaToOEEsx2UzvHb61/7Ew.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:R+16FPEQD1Dom3wRu6lREpD66eE=
X-Ed25519-Sig: c443f161441525e6823fd1cfeb1d17c5c0ba0541ffc2c58d8b17cd4957eb1fc7
315214571aeb1646b096f00b4475408fc080c95467e9eb7128cef0806bd4520a
X-Notice: Filtered by postfilter v. 0.9.3
X-Date: It's Fri Sep 11448 12:29:33 AM CET 1993, the September that never ends.
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
View all headers

Rich wrote:
> Stefan Claas <pollux@tilde.club> wrote:
> > Rich wrote:
> > > Stefan Claas <pollux@tilde.club> wrote:
> > > > Rich wrote:
> > > > > Stefan Claas <pollux@tilde.club> wrote:
> > > > > > Rich wrote:
> > > > > >
> > > > > > > Of course, this just brings to the front the OTP key distribution and
> > > > > > > key reuse problems.
> > > > > >
> > > > > > Forgot to mention, not with my programs, because also in this case I
> > > > > > can use for ternary xor encryption deterministic keys, valid for one
> > > > > > day (UTC +0000), so that border control does not find keys. :-)
> > > > >
> > > > > You'll have to explain further, as the above is not nearly enough
> > > > > explanation to understand what you are discussing.
> > > > >
> > > > > > I have made this a standard for some of my programs, because long ago
> > > > > > I thought of key distribution problems and looked for solutions,
> > > > > > which others afaik have not thought of (yet).
> > > > >
> > > > > Further explanation needed.
> > > >
> > > > Ok. You talked about key distribution problems with OTPs and management.
> > > >
> > > > I have Go programs which can generate as many random keys/pads per day
> > > > (UTC +0000) for my programs, based on a shared secret, consisting of
> > > > a password and salt.
> > > >
> > > > In order that this works Alice and Bob needs only one initial session,
> > > > where they transfer with a client/server program, which uses DHE/AES-GCM,
> > > > the shared secret via the Tor Network, to bypass third party servers
> > > > and NAT etc.
> > > >
> > > > Once the shared secret is transfered securely to Alice or Bob, they use
> > > > the key generation programs, which are deterministic. This means that
> > > > when Alice generates todays pads/keys she does not need to transfer them
> > > > to Bob, because Bob has the shared secret and can generate the same
> > > > determenistic keys for each day (UTC +0000).
> > > >
> > > > This procedure allows either Alice or Bob to travel, without worring that
> > > > some border patrol finds pads/keys, for daily usage, or If I would do
> > > > encryption with you without sending you pads in advance, via postal
> > > > service etc.
> > >
> > > Then the weakness here is this "generator algorithm". A OTP is only
> > > perfectly secure if the pads are true random sequences.
> > >
> > > Deterministic outputs from a seeded generator are not "true random
> > > sequences" so you will not gain the "unbreakable" aspect of a proper
> > > OTP.
> > >
> > > Will it likely be /good enough/ such that those of us left here are
> > > unlikely to break it: yes. Will it be good enough that one of the
> > > three-letter-agencies cannot break it: likely no.
> > >
> >
> > That is old saying , that it is only unbreakable with TRRNG. I believe
> > that nowadays PRNG can serve the purpose as well, for OTP encryption.
>
> You can believe what you wish. But for your belief to be accepted by
> more than yourself you'll need to show a proof of such. Neither of us
> being a "cryptographer" I'll continue to believe the existing proofs
> that for an OTP to be secure the pad needs to be generated from a true
> random source.
>
> > What patterns would distinguish a TRNG and PRNG OTP sheet, if a
> > cryptanalist would look at them, or when looking at a couple of
> > more sheets? The difference is IMHO none.
>
> Any deterministic generator system (i.e., a PRNG) is going to have some
> bias somewhere (possibly not noticable until a significant number of
> outputs are analyzed). It will be that bias that will provide the
> crack through which an actual cryptographer will break the system.
>

Like with my previous reply I use now my PC's internal TRNG (TPM 2.0 Chip)
with Go and can now generate true random ternary numbers for OTP sheets. :-)

These are now not deterministic and the key distribution problem comes up,
but at least this was a learning exercise and I may update other Go programs
of mine.

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Fri, 3 Jan 2025 01:04 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 02:04:21 +0100
Organization: To protect and to server
Message-ID: <vl7d2m$62u1$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl6lnl$3eumm$1@dont-email.me> <vl77gt$r10$2@paganini.bofh.team>
Mime-Version: 1.0
Injection-Date: Fri, 3 Jan 2025 01:04:22 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="199617"; posting-host="WyaToOEEsx2UzvHb61/7Ew.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:JgUl7KyxbcA+wOtz+/ZK4ZfbxMI=
X-Date: It's Fri Sep 11448 02:04:22 AM CET 1993, the September that never ends.
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Ed25519-Sig: 78acbd97e5b930561ebcdb556ef0971e078a835d81acb927565b647a48a64828
83c27d7ee09dd5c31a97cb66472358f05d1da9434744134a19735bcabcfc3200
View all headers

Stefan Claas wrote:

> These are now not deterministic and the key distribution problem comes up,
> but at least this was a learning exercise and I may update other Go programs
> of mine.

For the key distribion over the Internet I work on a solution with Tor Hidden
Services and Diffie-Hellman key exchange, using AES-GCM.

My old pads program is already updated. It compiled flawlessly for many
different platforms, including macOS, but I do not know if they all support
TPM 2.0, like Windows and Linux does.

https://github.com/706f6c6c7578/pads

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 3 Jan 2025 02:38 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 02:38:53 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 31
Message-ID: <vl7ijs$3jv4r$1@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl69r0$3vb75$1@paganini.bofh.team> <vl6mf1$3eumm$2@dont-email.me> <vl778r$r10$1@paganini.bofh.team>
Injection-Date: Fri, 03 Jan 2025 03:38:53 +0100 (CET)
Injection-Info: dont-email.me; posting-host="f70fcd979b09915f744ad22468595f16";
logging-data="3800219"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX190kkUADvDO1I5bIr3K54Fa"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:+5t9hi61ORZrSmG40Xl9Ln/I3cI=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
>
> Now I have used my PC's internal TRNG (TPM 2.0 Chip) via Go, instead of
> crypt/rand and the process is slower but looks like this:
>
> 4 4 3 6 3 6 3 4 4 6 4 2 1 5 1
> 1 5 6 6 1 1 6 3 1 2 5 6 1 2 4
> 2 4 2 3 5 1 2 6 5 1 2 1 2 5 3
> 1 4 5 5 6 6 3 5 2 5 5 6 4 2 2
>
> 5 3 1 5 2 4 5 4 6 1 1 3 4 5 4
> 3 2 5 4 4 4 6 3 1 5 6 6 2 6 2
> 2 4 5 5 5 5 2 6 5 6 3 3 3 1 6
> 3 3 2 2 3 6 5 3 2 2 1 6 6 4 6
>
> 1 4 5 3 4 3 1 6 3 2 1 1 6 3 4
> 6 5 2 4 3 3 3 5 1 4 2 5 4 3 3
> 3 4 5 2 5 3 1 4 6 1 6 3 2 5 6
> 5 4 6 4 6 6 2 4 2 2 6 4 4 1 4

The sort uniq 'distribution' now looks like this for the above:

count die face
25 1
29 2
30 3
32 4
31 5
33 6

Would have to run the 'rolls' throuogh die harder to learn any more.

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 3 Jan 2025 02:41 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 02:41:15 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 19
Message-ID: <vl7iob$3jv4r$2@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl6lnl$3eumm$1@dont-email.me> <vl77gt$r10$2@paganini.bofh.team> <vl7d2m$62u1$1@paganini.bofh.team>
Injection-Date: Fri, 03 Jan 2025 03:41:16 +0100 (CET)
Injection-Info: dont-email.me; posting-host="f70fcd979b09915f744ad22468595f16";
logging-data="3800219"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/uZCxLDh4odkoFkKb376w2"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:UK5CbfoFdWpf/qFV89lP6ptBrRU=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> Stefan Claas wrote:
>
>> These are now not deterministic and the key distribution problem comes up,
>> but at least this was a learning exercise and I may update other Go programs
>> of mine.
>
> For the key distribion over the Internet I work on a solution with Tor Hidden
> Services and Diffie-Hellman key exchange, using AES-GCM.
>
> My old pads program is already updated. It compiled flawlessly for many
> different platforms, including macOS, but I do not know if they all support
> TPM 2.0, like Windows and Linux does.

It is not so much 'support' TPM as it is "includes" a TPM. If the
machine does not have one (and many not so old and older systems do
not) then there is not one present to use in any fashion.

Subject: Re: Ternary Encoding :-)
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 3 Jan 2025 02:45 UTC
References: 1
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Thu, 2 Jan 2025 18:45:06 -0800
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <vl7ivj$3k1t8$1@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 03 Jan 2025 03:45:07 +0100 (CET)
Injection-Info: dont-email.me; posting-host="e94d1704a333ab297c4ae0db56ab3864";
logging-data="3803048"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19fhR5TDqtC0lF1/PSHro9oh+19RUs9hRE="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:/dwk9swcS63fVZe3n9vN93YEGmo=
Content-Language: en-US
In-Reply-To: <vl243l$3jkpe$1@paganini.bofh.team>
View all headers

On 12/31/2024 5:00 PM, Stefan Claas wrote:
> echo 'Happy News Year 2025' | ternary
> 2112102022020111101010222211010022112012102120110020100021120220
> 10000111010121200020221000211000220022020
>
> $ echo 'Happy News Year 2025' | ternary | ternary -d
> Happy News Year 2025
>
> (My program works with binary data as well.)
>

Side note, try to get 3-ary roots from the following... It's not that
hard but its fun wrt the results one can reap from it:

https://paulbourke.org/fractals/multijulia

;^)

Subject: Re: Ternary Encoding :-)
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 3 Jan 2025 05:03 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 05:03:20 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 62
Message-ID: <vl7r2o$3or1d$1@dont-email.me>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl6lnl$3eumm$1@dont-email.me> <vl77gt$r10$2@paganini.bofh.team> <vl7d2m$62u1$1@paganini.bofh.team>
Injection-Date: Fri, 03 Jan 2025 06:03:21 +0100 (CET)
Injection-Info: dont-email.me; posting-host="f70fcd979b09915f744ad22468595f16";
logging-data="3959853"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19sKZbRBWBzaMgvmwoeKTME"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:sVvdS+hx8izy4a+F4SSPS/Ri1U4=
View all headers

Stefan Claas <pollux@tilde.club> wrote:
> My old pads program is already updated. It compiled flawlessly for
> many different platforms, including macOS, but I do not know if they
> all support TPM 2.0, like Windows and Linux does.
>
> https://github.com/706f6c6c7578/pads

Looking over your pads program, while you are retreiving true random
numbers from the TPM chip, you are introducing a bias when you use the
random bytes from the TPM to output letters or digits.

Take for example your "letters" arm:

if l {
random, _ := tpm2.GetRandom(rwc, 5)
for m := 0; m < 5; m++ {
fmt.Printf("%c", 'A'+(random[m]%26))
}
}

Now, if I've decoded the awful documentation for the TPM2 module
properly [1] the tpm2.GetRandom call will return five bytes (presumably
unsigned bytes) of random data.

Then, you loop over the five bytes, outputting the letter that
corresponds to ASCII A plus the remainder after dividing the byte by
26. Which is where you introduce a bias.

A byte will have a value from 0 to 255, for 256 total values.

But 26 does not evenly divide 256. 256/26 ~ 9.846

26 divides 256 evenly 9 times, no problem here. That covers values 0
to 233. But for any bytes returned from GetRandom that fall into the
range 234 to 255, you have only 21 possible values that can return from
the modulo. So your remainder will be only 0 through 21. You'll never
get 22 through 25 out, because there is not enough numeric range in the
"tail" to return 22 through 25 from the modulo. So for any bytes with
values 234 to 255 from the TPM, you can return A through V but will
never return W, X, Y or Z.

So your resulting letters will have a bias for A through V.

The fix is easy, first check the value of the byte you are about to
use, and if it happens to be greater than 233, throw that byte away and
pull another from the TPM.

You produce the same bias for your digits, since an unsigned three byte
value is 2^24 = 16_777_216 but that is not evenly divisible by 100000.
So you'll have a range of "low numbers" that are slightly more likely
to occur (a bias) than they should if they were truly random.

This is one of the many examples where it is very easy to mess up the
implementation of a crypto system such that a crack is left for a
skilled cryptographer to exploit.

[1] it is actually worse than awful, it is non-existant, but that seems
to be a normal given aspect for most of the 'newfangled' languages
out there, no documentation in sight anywhere

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Fri, 3 Jan 2025 14:40 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 15:40:48 +0100
Organization: To protect and to server
Message-ID: <vl8sth$8esg$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl3q7v$3mbq0$1@paganini.bofh.team> <vl418a$2sv2k$1@dont-email.me> <vl4el9$3ndf1$1@paganini.bofh.team> <vl4f3g$2vav0$3@dont-email.me> <vl4mjv$3sqb1$1@paganini.bofh.team> <vl54qf$36b5p$1@dont-email.me> <vl6770$3v5qv$2@paganini.bofh.team> <vl6lnl$3eumm$1@dont-email.me> <vl77gt$r10$2@paganini.bofh.team> <vl7d2m$62u1$1@paganini.bofh.team> <vl7r2o$3or1d$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Fri, 3 Jan 2025 14:40:49 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="277392"; posting-host="ad5WMG6cRIBgYSC1mElkew.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:JGDr3RkqddEQMGSy5IRfGsPej14=
X-Ed25519-Sig: 5721cfc939c64ac6654c0ec446064d14b95e3457be2e310085a3ad7e2bf7af68
1b2339c1bc4030786d500fa24a8cf6754b8e92e62cdd7ad8c4861f5ff4630805
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Date: It's Fri Sep 11448 03:40:48 PM CET 1993, the September that never ends.
X-Notice: Filtered by postfilter v. 0.9.3
View all headers

Rich wrote:
> Stefan Claas <pollux@tilde.club> wrote:
> > My old pads program is already updated. It compiled flawlessly for
> > many different platforms, including macOS, but I do not know if they
> > all support TPM 2.0, like Windows and Linux does.
> >
> > https://github.com/706f6c6c7578/pads
>
> Looking over your pads program, while you are retreiving true random
> numbers from the TPM chip, you are introducing a bias when you use the
> random bytes from the TPM to output letters or digits.
>
> Take for example your "letters" arm:
>
> if l {
> random, _ := tpm2.GetRandom(rwc, 5)
> for m := 0; m < 5; m++ {
> fmt.Printf("%c", 'A'+(random[m]%26))
> }
> }
>
> Now, if I've decoded the awful documentation for the TPM2 module
> properly [1] the tpm2.GetRandom call will return five bytes (presumably
> unsigned bytes) of random data.
>
> Then, you loop over the five bytes, outputting the letter that
> corresponds to ASCII A plus the remainder after dividing the byte by
> 26. Which is where you introduce a bias.
>
> A byte will have a value from 0 to 255, for 256 total values.
>
> But 26 does not evenly divide 256. 256/26 ~ 9.846
>
> 26 divides 256 evenly 9 times, no problem here. That covers values 0
> to 233. But for any bytes returned from GetRandom that fall into the
> range 234 to 255, you have only 21 possible values that can return from
> the modulo. So your remainder will be only 0 through 21. You'll never
> get 22 through 25 out, because there is not enough numeric range in the
> "tail" to return 22 through 25 from the modulo. So for any bytes with
> values 234 to 255 from the TPM, you can return A through V but will
> never return W, X, Y or Z.
>
> So your resulting letters will have a bias for A through V.
>
> The fix is easy, first check the value of the byte you are about to
> use, and if it happens to be greater than 233, throw that byte away and
> pull another from the TPM.
>
> You produce the same bias for your digits, since an unsigned three byte
> value is 2^24 = 16_777_216 but that is not evenly divisible by 100000.
> So you'll have a range of "low numbers" that are slightly more likely
> to occur (a bias) than they should if they were truly random.
>
> This is one of the many examples where it is very easy to mess up the
> implementation of a crypto system such that a crack is left for a
> skilled cryptographer to exploit.
>
>
> [1] it is actually worse than awful, it is non-existant, but that seems
> to be a normal given aspect for most of the 'newfangled' languages
> out there, no documentation in sight anywhere

Excellent observation! Thanks a lot, much appreciated! The Go code and
binaries are now updated, according to your suggestions.

--
Regards
Stefan

Subject: Re: Ternary Encoding :-)
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Fri, 3 Jan 2025 15:13 UTC
References: 1 2
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: Ternary Encoding :-)
Date: Fri, 3 Jan 2025 16:13:52 +0100
Organization: To protect and to server
Message-ID: <vl8urh$8hto$1@paganini.bofh.team>
References: <vl243l$3jkpe$1@paganini.bofh.team> <vl7ivj$3k1t8$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Fri, 3 Jan 2025 15:13:53 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="280504"; posting-host="ad5WMG6cRIBgYSC1mElkew.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre29 (for GNU/Linux)
Cancel-Lock: sha1:OEWkWu8GzLobBAvtlUQGA8QHgxU=
X-Ed25519-Sig: 283b494a160b5769c684316786436efbd01fb1596957538fa163a6e8f0cd0098
fe6474d77142747c4ff6fb806806ad67d860aad0ac657c9b3b9a71ae3f446e0d
X-Notice: Filtered by postfilter v. 0.9.3
X-Date: It's Fri Sep 11448 04:13:52 PM CET 1993, the September that never ends.
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
View all headers

Chris M. Thomasson wrote:
> On 12/31/2024 5:00 PM, Stefan Claas wrote:
> > echo 'Happy News Year 2025' | ternary
> > 2112102022020111101010222211010022112012102120110020100021120220
> > 10000111010121200020221000211000220022020
> >
> > $ echo 'Happy News Year 2025' | ternary | ternary -d
> > Happy News Year 2025
> >
> > (My program works with binary data as well.)
> >
>
> Side note, try to get 3-ary roots from the following... It's not that
> hard but its fun wrt the results one can reap from it:
>
> https://paulbourke.org/fractals/multijulia

Nice, but I do no longer do Computer Graphics.

--
Regards
Stefan

Pages:1234

rocksolid light 0.9.8
clearnet tor