• Re: Patterns

    From Rich@21:1/5 to Stefan Claas on Fri Feb 23 05:08:29 2024
    In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
    Chris M. Thomasson wrote:

    If Bob and Alice have access to the same OPT, one of them can create
    a special plaintext that can give the message in the ciphertext, or
    whatever... Think about it... ;^)

    Can you craft an example, maybe with code (that compiles ...)?

    This is not go, but you should be able to follow along well enough.
    Note that ^ is Tcl's expr's byte wise XOR operator.:

    #!/usr/bin/tclsh

    # "OTP" - obtained by running this, then converted to 0x notation by hand:
    # dd if=/dev/urandom bs=1 count=2 | xxd
    # f1c3

    set otp 0xf1c3

    # show otp:
    puts [format "OTP: %04x" $otp]

    # message that Bob should see in the encrypted text
    # "feed"

    set bob 0xfeed

    # create Alice's message, which when 'encrypted' will result in Bob seeing
    # "feed" in the encrypted text

    set alice [expr {$otp ^ $bob}]

    # output Alice's message as a hex string:
    puts [format "Alice 'special' message: %04x" $alice]

    # encrypt Alice's special message using the OTP:

    set ciphertext [expr {$alice ^ $otp}]

    # output ciphertext as hex string
    puts [format "Ciphertext: %04x" $ciphertext]

    Running this results in:

    OTP: f1c3
    Alice 'special' message: 0f2e
    Ciphertext: feed

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Rich on Fri Feb 23 19:43:15 2024
    Rich wrote:

    In sci.crypt Stefan Claas <pollux@tilde.club> wrote:
    Chris M. Thomasson wrote:

    If Bob and Alice have access to the same OPT, one of them can
    create a special plaintext that can give the message in the
    ciphertext, or whatever... Think about it... ;^)

    Can you craft an example, maybe with code (that compiles ...)?

    This is not go, but you should be able to follow along well enough.
    Note that ^ is Tcl's expr's byte wise XOR operator.:

    #!/usr/bin/tclsh

    # "OTP" - obtained by running this, then converted to 0x notation
    by hand: # dd if=/dev/urandom bs=1 count=2 | xxd
    # f1c3

    set otp 0xf1c3

    # show otp:
    puts [format "OTP: %04x" $otp]

    # message that Bob should see in the encrypted text
    # "feed"

    set bob 0xfeed

    # create Alice's message, which when 'encrypted' will result in
    Bob seeing # "feed" in the encrypted text

    set alice [expr {$otp ^ $bob}]

    # output Alice's message as a hex string:
    puts [format "Alice 'special' message: %04x" $alice]

    # encrypt Alice's special message using the OTP:

    set ciphertext [expr {$alice ^ $otp}]

    # output ciphertext as hex string
    puts [format "Ciphertext: %04x" $ciphertext]

    Thanks for the code example.

    Running this results in:

    OTP: f1c3
    Alice 'special' message: 0f2e
    Ciphertext: feed

    He he, so Alice crafts a message she can't read herself, but the
    ciphertext is readable for third parties. It would be cool if there
    would be a real world usage scenario for this.

    Maybe a verifying scheme, like Alice submits a long hex key to Bob,
    in that form, so that he knows the message comes from Alice if it
    says 'the quick brown fox jumps ...'

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 0c8a7d5aead639537cab202da5fab93756cc33bd29705ca6edc240c9172d1a0e e8dfca6350ec5e2963d906042c7667824673753acba4b7495a909b54bc1b6809

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to Stefan Claas on Fri Feb 23 20:00:56 2024
    Stefan Claas <pollux@tilde.club> wrote:
    Thanks for the code example.

    Running this results in:

    OTP: f1c3
    Alice 'special' message: 0f2e
    Ciphertext: feed

    He he, so Alice crafts a message she can't read herself,

    Yes, doing anything like this to "craft" any one of the three pieces
    means one of the other pieces is going to look like gibberish.

    but the ciphertext is readable for third parties. It would be cool
    if there would be a real world usage scenario for this.

    Say you receive a purported encrypted message that reads thusly
    (assuming ASCII bytes):

    *1234567890ABCDEF01234567890ABCDEF0123456

    And you would like to "decrypt" it to read:

    The quick brown fox jumped over the lazy

    Why you might want to do this I can't say, perhaps to fool someone else
    who isn't very cryptographicly aware?

    So you just create an OTP pad as the bytewise XOR of each byte of the
    purported ciphertext with each byte of the desired decrypted text.
    I.e., you do:

    otp[i] = cipher[i] ^ desired_message[i] for i from 0 ... length(cipher)

    Then, you go to your not so knowledgable friend, indicating that you
    just received this message, and when you decrypt with "the pad" (not
    mentioning you fashioned "the pad" yourself) the message about the fox
    pops out.

    Maybe a verifying scheme, like Alice submits a long hex key to Bob,
    in that form, so that he knows the message comes from Alice if it
    says 'the quick brown fox jumps ...'

    Not really a very safe way to 'verify' in that once someone
    learns/deduces the method, they can repeat with ease (i.e., the
    algorithm here has to be kept secret). At least a HMAC, provided Alice
    and Bob do in fact keep their shared key secret, is much harder to
    fake, even when Eve knows all about the algorithm.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Rich on Fri Feb 23 22:16:17 2024
    Rich wrote:

    Stefan Claas <pollux@tilde.club> wrote:
    Thanks for the code example.

    Running this results in:

    OTP: f1c3
    Alice 'special' message: 0f2e
    Ciphertext: feed

    He he, so Alice crafts a message she can't read herself,

    Yes, doing anything like this to "craft" any one of the three pieces
    means one of the other pieces is going to look like gibberish.

    but the ciphertext is readable for third parties. It would be cool
    if there would be a real world usage scenario for this.

    Say you receive a purported encrypted message that reads thusly
    (assuming ASCII bytes):

    *1234567890ABCDEF01234567890ABCDEF0123456

    And you would like to "decrypt" it to read:

    The quick brown fox jumped over the lazy

    Why you might want to do this I can't say, perhaps to fool someone
    else who isn't very cryptographicly aware?

    Yes, so that 3rd parties do not see that this is an encrypted message,
    kind of steganography.

    So you just create an OTP pad as the bytewise XOR of each byte of the purported ciphertext with each byte of the desired decrypted text.
    I.e., you do:

    otp[i] = cipher[i] ^ desired_message[i] for i from 0 ...
    length(cipher)

    Then, you go to your not so knowledgable friend, indicating that you
    just received this message, and when you decrypt with "the pad" (not mentioning you fashioned "the pad" yourself) the message about the
    fox pops out.

    Maybe a verifying scheme, like Alice submits a long hex key to Bob,
    in that form, so that he knows the message comes from Alice if it
    says 'the quick brown fox jumps ...'

    Not really a very safe way to 'verify' in that once someone
    learns/deduces the method, they can repeat with ease (i.e., the
    algorithm here has to be kept secret). At least a HMAC, provided
    Alice and Bob do in fact keep their shared key secret, is much harder
    to fake, even when Eve knows all about the algorithm.

    Yes, understand, but if such a message would be posted anonymously,
    probably only the receiver(s) know whats all about it.

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 6a0eaa08046bba8dc871aa0b8efdc88737ae9e8687d310cb79e5f0329ae52b40 acd37e2d21cbfb7ca41095488a261f0c68031a0dea86e2c698a3f70c51581701

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Doc O'Leary ,@21:1/5 to Stefan Claas on Sat Feb 24 16:44:46 2024
    For your reference, records indicate that
    Stefan Claas <pollux@tilde.club> wrote:

    He he, so Alice crafts a message she can't read herself, but the
    ciphertext is readable for third parties. It would be cool if there
    would be a real world usage scenario for this.

    There are probably plenty. One obvious use is simply transforming one OTP
    to another OTP, for whatever reason it might make sense to “refresh” or “resync" the parties holding the OTP.

    As an example, you can create a kind of dead man’s switch if you not only exchange an OTP with someone, but also agree to XOR it with some commonly available innocuous “message”, like a news story/video/podcast, or a nightly
    build of some open source software, or pretty much any shared-but-non-secret info. Access to the OTP alone does not then compromise all the secrets.

    Another use might be to just flat out *lie* about the data format your encrypted message is:

    <https://en.wikipedia.org/wiki/Magic_number_(programming)#In_files>

    I mean, yeah, you can certainly try hide the message in another *valid*
    file format, but you can spice things up for the attacker by forcing them
    to consider if the JPEG they have intercepted is corrupted, or was ever
    even a JPEG at all! :-)

    --
    "Also . . . I can kill you with my brain."
    River Tam, Trash, Firefly

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to All on Sat Feb 24 20:06:27 2024
    Doc O'Leary , wrote:

    For your reference, records indicate that
    Stefan Claas <pollux@tilde.club> wrote:

    He he, so Alice crafts a message she can't read herself, but the
    ciphertext is readable for third parties. It would be cool if there
    would be a real world usage scenario for this.

    There are probably plenty. One obvious use is simply transforming
    one OTP to another OTP, for whatever reason it might make sense to “refresh” or “resync" the parties holding the OTP.

    As an example, you can create a kind of dead man’s switch if you not
    only exchange an OTP with someone, but also agree to XOR it with some commonly available innocuous “message”, like a news
    story/video/podcast, or a nightly build of some open source software,
    or pretty much any shared-but-non-secret info. Access to the OTP
    alone does not then compromise all the secrets.

    Another use might be to just flat out *lie* about the data format
    your encrypted message is:

    <https://en.wikipedia.org/wiki/Magic_number_(programming)#In_files>

    I mean, yeah, you can certainly try hide the message in another
    *valid* file format, but you can spice things up for the attacker by
    forcing them to consider if the JPEG they have intercepted is
    corrupted, or was ever even a JPEG at all! :-)

    Thanks for the explanation, much appreciated! :-)

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 5d8b1bcd6084543a05426e256fbaa12e44e570cd152fd6c8f61c26bb06519ed9 ea0107239bf7465654726af7f3158651d3bfeb1056d0ca709e48af8a4d279d0d

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Harnden@21:1/5 to Stefan Claas on Sun Feb 25 17:07:45 2024
    On 25/02/2024 16:44, Stefan Claas wrote:
    Chris M. Thomasson wrote:

    On 2/23/2024 1:16 PM, Stefan Claas wrote:
    Rich wrote:

    Stefan Claas <pollux@tilde.club> wrote:
    Thanks for the code example.

    Running this results in:

    OTP: f1c3
    Alice 'special' message: 0f2e
    Ciphertext: feed

    He he, so Alice crafts a message she can't read herself,

    Yes, doing anything like this to "craft" any one of the three
    pieces means one of the other pieces is going to look like
    gibberish.

    but the ciphertext is readable for third parties. It would be
    cool if there would be a real world usage scenario for this.

    Say you receive a purported encrypted message that reads thusly
    (assuming ASCII bytes):

    *1234567890ABCDEF01234567890ABCDEF0123456

    And you would like to "decrypt" it to read:

    The quick brown fox jumped over the lazy

    Why you might want to do this I can't say, perhaps to fool someone
    else who isn't very cryptographicly aware?

    Yes, so that 3rd parties do not see that this is an encrypted
    message, kind of steganography.

    So you just create an OTP pad as the bytewise XOR of each byte of
    the purported ciphertext with each byte of the desired decrypted
    text. I.e., you do:

    otp[i] = cipher[i] ^ desired_message[i] for i from 0 ...
    length(cipher)

    Then, you go to your not so knowledgable friend, indicating that
    you just received this message, and when you decrypt with "the
    pad" (not mentioning you fashioned "the pad" yourself) the message
    about the fox pops out.

    Maybe a verifying scheme, like Alice submits a long hex key to
    Bob, in that form, so that he knows the message comes from Alice
    if it says 'the quick brown fox jumps ...'

    Not really a very safe way to 'verify' in that once someone
    learns/deduces the method, they can repeat with ease (i.e., the
    algorithm here has to be kept secret). At least a HMAC, provided
    Alice and Bob do in fact keep their shared key secret, is much
    harder to fake, even when Eve knows all about the algorithm.

    Yes, understand, but if such a message would be posted anonymously,
    probably only the receiver(s) know whats all about it.

    Bob: "The dog was walking itself when the sun was down yesterday." in
    a public forum.

    Alice reads that and just "knows" to meet Bob in a _specific_ park
    where there are dogs off their leashes when the sun is up in 42 days
    from now...

    Something like that? Never mind that Alice is under surveillance...

    Yes, that would be nice, if a software implementation for that exists.

    One the other side, you can hide OTP messages in text, like this:

    Create your OPT message, consisting of digits, like usual. Once done
    create a harmless story, with a couple of sentences. The word count
    of each sentence represents a digit in the OTP message.

    Once Bob receives the story from Alice he simple counts the words in
    each sentence and writes down the digits, so that he later can decrypt,
    with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many words
    per sentence must be in the story. I did this once successfully. :-)


    That isn't random, so isn't a OTP at all.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Chris M. Thomasson on Sun Feb 25 17:44:19 2024
    Chris M. Thomasson wrote:

    On 2/23/2024 1:16 PM, Stefan Claas wrote:
    Rich wrote:

    Stefan Claas <pollux@tilde.club> wrote:
    Thanks for the code example.

    Running this results in:

    OTP: f1c3
    Alice 'special' message: 0f2e
    Ciphertext: feed

    He he, so Alice crafts a message she can't read herself,

    Yes, doing anything like this to "craft" any one of the three
    pieces means one of the other pieces is going to look like
    gibberish.

    but the ciphertext is readable for third parties. It would be
    cool if there would be a real world usage scenario for this.

    Say you receive a purported encrypted message that reads thusly
    (assuming ASCII bytes):

    *1234567890ABCDEF01234567890ABCDEF0123456

    And you would like to "decrypt" it to read:

    The quick brown fox jumped over the lazy

    Why you might want to do this I can't say, perhaps to fool someone
    else who isn't very cryptographicly aware?

    Yes, so that 3rd parties do not see that this is an encrypted
    message, kind of steganography.

    So you just create an OTP pad as the bytewise XOR of each byte of
    the purported ciphertext with each byte of the desired decrypted
    text. I.e., you do:

    otp[i] = cipher[i] ^ desired_message[i] for i from 0 ...
    length(cipher)

    Then, you go to your not so knowledgable friend, indicating that
    you just received this message, and when you decrypt with "the
    pad" (not mentioning you fashioned "the pad" yourself) the message
    about the fox pops out.

    Maybe a verifying scheme, like Alice submits a long hex key to
    Bob, in that form, so that he knows the message comes from Alice
    if it says 'the quick brown fox jumps ...'

    Not really a very safe way to 'verify' in that once someone
    learns/deduces the method, they can repeat with ease (i.e., the
    algorithm here has to be kept secret). At least a HMAC, provided
    Alice and Bob do in fact keep their shared key secret, is much
    harder to fake, even when Eve knows all about the algorithm.

    Yes, understand, but if such a message would be posted anonymously, probably only the receiver(s) know whats all about it.

    Bob: "The dog was walking itself when the sun was down yesterday." in
    a public forum.

    Alice reads that and just "knows" to meet Bob in a _specific_ park
    where there are dogs off their leashes when the sun is up in 42 days
    from now...

    Something like that? Never mind that Alice is under surveillance...

    Yes, that would be nice, if a software implementation for that exists.

    One the other side, you can hide OTP messages in text, like this:

    Create your OPT message, consisting of digits, like usual. Once done
    create a harmless story, with a couple of sentences. The word count
    of each sentence represents a digit in the OTP message.

    Once Bob receives the story from Alice he simple counts the words in
    each sentence and writes down the digits, so that he later can decrypt,
    with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many words
    per sentence must be in the story. I did this once successfully. :-)

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 3333210c0ee5a760d6f03d01d5717f1d273f6e479f6db89a69b12b9b8d8a6d7b 3c082fb637cef297ee3b2bcb664f24ce4dded79dc2f9c5419a31ce41c297130d

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Richard Harnden on Sun Feb 25 18:32:25 2024
    Richard Harnden wrote:

    Create your OPT message, consisting of digits, like usual. Once done
    create a harmless story, with a couple of sentences. The word count
    of each sentence represents a digit in the OTP message.

    Once Bob receives the story from Alice he simple counts the words in
    each sentence and writes down the digits, so that he later can
    decrypt, with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many
    words per sentence must be in the story. I did this once
    successfully. :-)


    That isn't random, so isn't a OTP at all.

    Excuse me, you create random pads as usual and the OTP messages as
    usual, which is random and from the ciphertext digits you create with
    the help of AI your story.

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 1c4087b8b9c1a9574db57d25a7af79286ee494146cce2de510a325bc1fd4ce17 8d8d8d68442dc1ca5e6bb4c2861981293318092685fd6ff39b9a47214e22410d

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Harnden@21:1/5 to Stefan Claas on Sun Feb 25 18:12:43 2024
    On 25/02/2024 17:59, Stefan Claas wrote:
    Stefan Claas wrote:

    Richard Harnden wrote:

    Create your OPT message, consisting of digits, like usual. Once
    done create a harmless story, with a couple of sentences. The
    word count of each sentence represents a digit in the OTP message.

    Once Bob receives the story from Alice he simple counts the words
    in each sentence and writes down the digits, so that he later can
    decrypt, with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many
    words per sentence must be in the story. I did this once
    successfully. :-)


    That isn't random, so isn't a OTP at all.

    Excuse me, you create random pads as usual and the OTP messages as
    usual, which is random and from the ciphertext digits you create with
    the help of AI your story.

    <https://rijmenants.blogspot.com/2014/12/wps-secret-numbers-in-letters.html>


    I'm not sure what you're trying to do, then.

    Combining a OTP with steganography is just going to make the pad much
    longer. And the reason OTPs aren't used is that they are difficult to
    securely exchange, mostly because they are too long.

    Aren't you making the problem worse?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Stefan Claas on Sun Feb 25 18:59:20 2024
    Stefan Claas wrote:

    Richard Harnden wrote:

    Create your OPT message, consisting of digits, like usual. Once
    done create a harmless story, with a couple of sentences. The
    word count of each sentence represents a digit in the OTP message.

    Once Bob receives the story from Alice he simple counts the words
    in each sentence and writes down the digits, so that he later can decrypt, with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many
    words per sentence must be in the story. I did this once
    successfully. :-)


    That isn't random, so isn't a OTP at all.

    Excuse me, you create random pads as usual and the OTP messages as
    usual, which is random and from the ciphertext digits you create with
    the help of AI your story.

    <https://rijmenants.blogspot.com/2014/12/wps-secret-numbers-in-letters.html>

    Regards
    Stefan
    --
    ----Ed25519 Signature---- dc19ac1817f25ebe02c54514b64d911a701c338e4b3bd618e47d37756ca73a31 3c6c761eb5b79ed2b00b11af5ab46ed4773cba010c572c069d5ff838d2578d0c

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Richard Harnden on Sun Feb 25 19:23:51 2024
    Richard Harnden wrote:

    On 25/02/2024 17:59, Stefan Claas wrote:
    Stefan Claas wrote:

    Richard Harnden wrote:

    Create your OPT message, consisting of digits, like usual. Once
    done create a harmless story, with a couple of sentences. The
    word count of each sentence represents a digit in the OTP
    message.

    Once Bob receives the story from Alice he simple counts the words
    in each sentence and writes down the digits, so that he later can
    decrypt, with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many
    words per sentence must be in the story. I did this once
    successfully. :-)


    That isn't random, so isn't a OTP at all.

    Excuse me, you create random pads as usual and the OTP messages as
    usual, which is random and from the ciphertext digits you create
    with the help of AI your story.

    <https://rijmenants.blogspot.com/2014/12/wps-secret-numbers-in-letters.html>


    I'm not sure what you're trying to do, then.

    Combining a OTP with steganography is just going to make the pad much
    longer. And the reason OTPs aren't used is that they are difficult
    to securely exchange, mostly because they are too long.

    Aren't you making the problem worse?

    Ok, I must admit that the OP's thread was about 'Patterns', but I
    replied to Chris, showing another way.

    I somehow doubt that we can create proper (i.e. long) cipher text
    consisting of a pattern, shown by the OP, in form of software and
    that it can be reused with other plain code messages. I can be wrong
    of course and would like to see such a solution.

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 31412e4b9c6ea60f0a1e7d437766b3bfe4e5a89f3ccbcfb558dcdb212bf328cd a1d4bc51bdb8914c9c769b1f3fc8049158852e6515ed1c8fd7398672e1ea290e

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to Stefan Claas on Sun Feb 25 18:50:32 2024
    Stefan Claas <pollux@tilde.club> wrote:
    Richard Harnden wrote:

    Create your OPT message, consisting of digits, like usual. Once done
    create a harmless story, with a couple of sentences. The word count
    of each sentence represents a digit in the OTP message.

    Once Bob receives the story from Alice he simple counts the words in
    each sentence and writes down the digits, so that he later can
    decrypt, with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many
    words per sentence must be in the story. I did this once
    successfully. :-)


    That isn't random, so isn't a OTP at all.

    Excuse me, you create random pads as usual and the OTP messages as
    usual, which is random and from the ciphertext digits you create with
    the help of AI your story.

    Your plan is to hide the encrypted message using steganography.

    https://en.wikipedia.org/wiki/Steganography

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to Stefan Claas on Sun Feb 25 19:08:18 2024
    Stefan Claas <pollux@tilde.club> wrote:
    Richard Harnden wrote:

    On 25/02/2024 17:59, Stefan Claas wrote:
    Stefan Claas wrote:

    Richard Harnden wrote:

    Create your OPT message, consisting of digits, like usual. Once
    done create a harmless story, with a couple of sentences. The
    word count of each sentence represents a digit in the OTP
    message.

    Once Bob receives the story from Alice he simple counts the words
    in each sentence and writes down the digits, so that he later can
    decrypt, with the exchanged pads, the story.

    You can let AI, like Bing, write the stories and tell it how many
    words per sentence must be in the story. I did this once
    successfully. :-)


    That isn't random, so isn't a OTP at all.

    Excuse me, you create random pads as usual and the OTP messages as
    usual, which is random and from the ciphertext digits you create
    with the help of AI your story.

    <https://rijmenants.blogspot.com/2014/12/wps-secret-numbers-in-letters.html>


    I'm not sure what you're trying to do, then.

    Combining a OTP with steganography is just going to make the pad much
    longer. And the reason OTPs aren't used is that they are difficult
    to securely exchange, mostly because they are too long.

    Aren't you making the problem worse?

    Ok, I must admit that the OP's thread was about 'Patterns', but I

    Of which I still highly suspect that the doctor was simply trolling.

    replied to Chris, showing another way.

    I somehow doubt that we can create proper (i.e. long) cipher text
    consisting of a pattern, shown by the OP, in form of software and
    that it can be reused with other plain code messages. I can be wrong
    of course and would like to see such a solution.

    Presuming "the doctor" was not actually trolling (99% probability it
    was a troll) then the doctors question was "what algorithm was used to encrypt". Of course the simplest answer is: "unknown, insufficient
    information provided to answer that question".

    But, presuming one, for some reason, did want a message to 'ecrypt' to
    the doctor's original pattern, then one has three choices to obtain
    such:

    1) brute force try keys and/or inputs to a selected algorithm until
    finding a key/input which results in that specific output. This choice
    is likely to take a nearly infinite amount of time.

    2) analyze the mathematics of a selected algorithm sufficient to be
    able to select a given key and input which would result in the doctor's
    output. This would also possibly take significant time, but if one
    succeeded here, one would also likely have a paper worthy of
    publication and also likely have found a significant break of the
    selected algorithm.

    3) use the OTP algorithm, and fashion one of either a special OTP that
    converts a given message of exactly the output length into that output
    or fashion a special message that for a given OTP creates that output.

    This is the route that is the quickest, because fashioning either the
    "special OTP" or the "special message" is simply bitwise xor of the
    doctors output with a selected message (to create a special OTP) or
    with a given OTP (to create a special message).

    4) create a custom "algorithm" that "encrypts" the message to that
    output. This option is little different from #3 beyond it uses "custom algorithm X" instead of the OTP algorithm.



    Therefore, given the lack of information in the doctors initial post, a reasonable "possible encryption algorithm" to 'create' that output
    would be an OTP with specially crafted message or pad.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Rich on Sun Feb 25 20:38:53 2024
    Rich wrote:

    [...]

    Therefore, given the lack of information in the doctors initial post,
    a reasonable "possible encryption algorithm" to 'create' that output
    would be an OTP with specially crafted message or pad.

    Yes, since the 'Doctor gave little info, I leave it as it is and
    concentrate on other things, but because the Subject: is Patterns,
    I have one for the Doctor, he can try to decode. :-)

    🔵🔴🔵🔵🔵🔲🔴🔵🔵🔵🔴🔲🔴🔵🔴🔴🔴🔲🔴🔵🔴🔴🔵🔲🔵🔵🔴🔴🔵🔲🔴🔴🔴🔵🔴
    🔵🔵🔵🔴🔴🔲🔵🔴🔴🔴🔴🔲🔵🔴🔴🔴🔵🔲🔵🔴🔵🔵🔵🔲🔴🔵🔴🔴🔵🔲🔵🔵🔵🔴🔵
    🔵🔵🔵🔵🔵🔲🔴🔴🔵🔴🔴🔲🔴🔵🔵🔴🔴🔲🔵🔵🔴🔵🔴🔲🔵🔴🔴🔴🔴🔲🔵🔵🔵🔵🔴
    🔴🔴🔵🔴🔵🔲🔵🔵🔵🔴🔵🔲🔵🔵🔵🔵🔵🔲🔴🔴🔴🔵🔴🔲🔵🔵🔵🔴🔴🔲🔵🔴🔵🔵🔴
    🔵🔴🔴🔵🔴🔲🔴🔵🔴🔵🔴🔲🔴🔵🔵🔴🔵🔲🔴🔵🔵🔴🔵🔲🔵🔵🔵🔵🔵🔲🔴🔴🔴🔵🔵
    🔵🔵🔵🔴🔴🔲🔵🔴🔴🔵🔵🔲🔵🔴🔴🔵🔵🔲🔴🔵🔴🔵🔴🔲🔴🔵🔵🔵🔵🔲🔴🔵🔴🔴🔴
    🔵🔵🔴🔴🔵🔲🔴🔴🔵🔵🔴🔲🔵🔴🔵🔵🔴🔲🔵🔵🔵🔵🔵🔲🔵🔴🔴🔵🔵🔲🔵🔴🔵🔵🔴
    🔴🔵🔵🔴🔵🔲🔴🔵🔵🔴🔵🔲🔵🔵🔵🔵🔵🔲🔴🔴🔴🔵🔵🔲🔴🔴🔵🔴🔴🔲🔵🔴🔴🔴🔴
    🔵🔵🔴🔵🔵🔲🔵🔵🔵🔵🔴🔲🔴🔵🔴🔵🔴🔲🔴🔵🔴🔴🔵🔲🔴🔵🔵🔴🔵🔲🔴🔴🔵🔴🔴
    🔴🔵🔵🔴🔴🔲🔵🔵🔴🔵🔵🔲🔵🔵🔴🔵🔵🔲🔵🔵🔵🔵🔴🔲🔴🔵🔵🔵🔵🔲🔴🔵🔴🔴🔵
    🔴🔴🔴🔵🔵🔲🔴🔴🔵🔵🔴🔲🔵🔵🔵🔵🔴🔲🔵🔵🔵🔵🔵🔲🔵🔴🔴🔴🔵🔲🔵🔵🔵🔵🔴
    🔴🔴🔵🔵🔴🔲🔵🔵🔴🔴🔵🔲🔴🔴🔴🔴🔵🔲🔴🔴🔴🔵🔴🔲🔴🔵🔵🔴🔴🔲🔵🔴🔵🔵🔴
    🔵🔴🔴🔵🔵🔲🔴🔵🔵🔵🔴🔲🔴🔵🔵🔴🔵🔲🔴🔵🔵🔴🔵🔲🔵🔵🔵🔵🔵🔲🔴🔴🔵🔴🔴
    🔵🔴🔵🔴🔴🔲🔵🔴🔴🔴🔴🔲🔵🔴🔴🔴🔵🔲🔵🔴🔵🔵🔴🔲🔴🔵🔵🔴🔵🔲🔴🔵🔵🔴🔵
    🔵🔵🔵🔵🔵🔲🔴🔴🔵🔴🔵🔲🔵🔴🔵🔴🔴🔲🔵🔴🔴🔴🔵🔲🔵🔴🔴🔵🔵🔲🔴🔴🔵🔵🔴
    🔴🔵🔴🔴🔴🔲🔴🔵🔴🔴🔴🔲🔵🔵🔴🔵🔵🔲🔴🔴🔵🔴🔴🔲🔵🔴🔵🔴🔴🔲🔵🔵🔵🔵🔴
    🔵🔴🔴🔴🔵🔲🔴🔵🔵🔵🔴🔲🔴🔵🔴🔵🔵🔲🔴🔵🔴🔴🔵🔲🔴🔴🔴🔴🔵🔲🔴🔴🔵🔴🔴
    🔴🔵🔵🔴🔴🔲🔴🔵🔵🔴🔴🔲🔵🔵🔴🔵🔴🔲🔴🔵🔵🔵🔵🔲🔴🔵🔵🔵🔵🔲🔵🔵🔴🔴🔵
    🔴🔴🔵🔵🔵🔲🔴🔴🔵🔴🔵🔲🔵🔴🔵🔴🔴🔲🔵🔴🔵🔴🔴🔲🔵🔴🔴🔵🔵🔲🔴🔵🔴🔵🔵
    🔴🔵🔵🔵🔵🔲🔵🔵🔴🔴🔵🔲🔵🔵🔵🔴🔵🔲🔵🔴🔵🔵🔵🔲🔵🔵🔵🔴🔴🔲🔴🔵🔵🔴🔵
    🔵🔴🔴🔵🔵🔲🔴🔵🔴🔵🔴🔲🔴🔵🔵🔴🔴🔲🔵🔵🔴🔴🔵🔲🔵🔴🔵🔴🔵🔲🔴🔴🔴🔵🔵
    🔴🔵🔵🔴🔴🔲🔵🔵🔴🔵🔴🔲🔵🔴🔴🔵🔴🔲🔴🔴🔵🔵🔴🔲🔴🔵🔵🔵🔴🔲🔴🔵🔴🔴🔵
    🔵🔴🔵🔴🔵🔲🔵🔴🔵🔵🔵🔲🔵🔵🔵🔴🔴🔲🔵🔵🔴🔵🔴🔲🔵🔴🔴🔴🔵🔲🔴🔵🔵🔵🔴
    🔴🔵🔵🔵🔴🔲🔴🔵🔵🔴🔵🔲🔴🔴🔴🔵🔵🔲

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 50fd9c70676ccf73bbec2d451c4b86c4478d18d5f091b6e4b7c348326184b35d c6b3b30ee77317082481081eda6b4bc62581bc02f465268c6e059fcba05dce09

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Stefan Claas on Mon Feb 26 11:51:40 2024
    Stefan Claas wrote:

    Rich wrote:

    [...]

    Therefore, given the lack of information in the doctors initial
    post, a reasonable "possible encryption algorithm" to 'create' that
    output would be an OTP with specially crafted message or pad.

    Yes, since the 'Doctor gave little info, I leave it as it is and
    concentrate on other things, but because the Subject: is Patterns,
    I have one for the Doctor, he can try to decode. :-)

    🔵🔴🔵🔵🔵🔲🔴🔵🔵🔵🔴🔲🔴🔵🔴🔴🔴🔲🔴🔵🔴🔴🔵🔲🔵🔵🔴🔴🔵🔲🔴🔴🔴🔵🔴

    Updated the encoder, so that the white square is a white circle. :-)

    🔵🔴🔵🔵🔴⚪🔵🔵🔵🔵🔴⚪🔴🔵🔵🔴🔵⚪🔴🔵🔴🔴🔵⚪🔴🔴🔵🔵🔵⚪🔴🔴🔵🔴🔴
    🔵🔵🔵🔴🔴⚪🔵🔴🔴🔴🔴⚪🔵🔵🔴🔵🔵⚪🔵🔵🔵🔵🔴⚪🔵🔴🔵🔴🔴⚪🔴🔵🔴🔴🔵
    🔴🔴🔴🔴🔵⚪🔴🔴🔴🔵🔵⚪🔴🔵🔵🔴🔴⚪🔵🔴🔴🔵🔵⚪🔵🔴🔴🔵🔵⚪🔴🔵🔵🔵🔵
    🔴🔵🔵🔵🔵⚪🔴🔵🔵🔴🔵⚪🔵🔵🔵🔵🔵⚪🔵🔴🔴🔴🔵⚪🔴🔵🔵🔵🔴⚪🔵🔴🔴🔵🔴
    🔵🔵🔴🔵🔴⚪🔵🔵🔴🔵🔵⚪

    Regards
    Stefan
    --
    ----Ed25519 Signature---- 358b6316425f212f655fc6e0b4a26ed4a3d91c656eb394821a80d27bcbc2d618 0a3b2dda1d1e2104f128b494a49819f9525d171c82e2d7dae77fd92053c22a06

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)