23831363733383736343339323531363832333934373135393537313238343336313433373536393''.join([hex(ord(c))[2:] for c in n]) '3231343936333538373736383531323334393533393834373136323332313637353839343439353
from textwrap import wrap; ''.join([chr(int(n, 16)) for n in wrap(''.join([hex(ord(c))[2:] for c in n]), 2)]) '214963587768512349539847162321675894495281673876439251682394715957128436143756928'
h = ''.join([hex(ord(c))[2:] for c in n])
from textwrap import wrap
''.join([chr(int(n, 16)) for n in wrap(h, 2)]) '214963587768512349539847162321675894495281673876439251682394715957128436143756928'
A new idea to solve the problem with a secret (well, now not so secret)
code scheme, one that you don't have to keep hiding. Here we can hide it
in plain sight. :)
Go here, It's a Sudoku game:
And key source can also be obsfucated somewhat, in that one could
combine the numbers in a pattern (zig-zag, circular, etc., i.e.,
anything other than left to right top to bottom).
http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=4719759cad9265f6f38ec25a7fbec19144df819e9f049d87a016c43a86c864c66366e5162872b616a579549433dbcb93fa5d17601e6f8e9c6eb9c34ff0884362a13437d0d0714f18f8ff2ab75a37a4ee
On Thu, 20 Jun 2024 19:16:00 -0700, Chris M. Thomasson wrote:
http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=4719759cad9265f6f38ec25a7fbec19144df819e9f049d87a016c43a86c864c66366e5162872b616a579549433dbcb93fa5d17601e6f8e9c6eb9c34ff0884362a13437d0d0714f18f8ff2ab75a37a4ee
I don't get it.
Decrypted: <<< that...
No shit! Thanks. <<< this...
On Thu, 20 Jun 2024 20:45:24 -0700, Chris M. Thomasson wrote:
... generating a
complex password from a simple password...
Op 22-6-2024 om 10:54 schreef Richard Harnden:
On 21/06/2024 21:31, Chris M. Thomasson wrote:
... generating a
complex password from a simple password...
You can't actually increase the entropy
Perhaps, but the recent discussions here seem to boil down to "password
based key derivation functions" which may frustrate bruteforce attacks a
bit.
On 6/21/2024 3:01 PM, Rich wrote:
Cri-Cri <cri@cri.cri.invalid> wrote:
On Thu, 20 Jun 2024 20:45:24 -0700, Chris M. Thomasson wrote:
Chris very much so likes to "insert" his hmac cipher into every
discussion thread, even those where it is off topic (although the
off-topicness is questionable here....).
He did this so much that Richard Heathfield killfiled him a couple
years back after having become frustrated with his "insertions" (among
other things).
Ahhh, the open secret... I gave away too many of my experiments. He got pissed.
On 6/22/2024 9:09 AM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
On 6/21/2024 3:01 PM, Rich wrote:
Cri-Cri <cri@cri.cri.invalid> wrote:
On Thu, 20 Jun 2024 20:45:24 -0700, Chris M. Thomasson wrote:
Chris very much so likes to "insert" his hmac cipher into every
discussion thread, even those where it is off topic (although the
off-topicness is questionable here....).
He did this so much that Richard Heathfield killfiled him a couple
years back after having become frustrated with his "insertions" (among >>>> other things).
Ahhh, the open secret... I gave away too many of my experiments. He got
pissed.
More accurately, you *hijacked* too many threads to insert your hmac
cipher into them, and then did not listen and crucially, *adjust your
behavior in the face of negative feedback* about your doing so, with
the result that he got tired of the hijacking and killfiled you.
Oh. I do remember him getting pissed off about me talking to much about
my progress with SCOS.
Oscar <oxxxxxxxxxxxs@gmail.com> wrote:
Op 22-6-2024 om 10:54 schreef Richard Harnden:
On 21/06/2024 21:31, Chris M. Thomasson wrote:
... generating a
complex password from a simple password...
You can't actually increase the entropy
Perhaps, but the recent discussions here seem to boil down to "password based key derivation functions" which may frustrate bruteforce attacks a bit.
The thread has kind of drifted in that direction. It began as a way to
try to "remember" a complex password by encoding it as "something else"
such that one might not need to worry should the stazi examine your
papers and find the "something else" in your possession.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 489 |
Nodes: | 16 (2 / 14) |
Uptime: | 10:54:57 |
Calls: | 9,665 |
Calls today: | 7 |
Files: | 13,711 |
Messages: | 6,167,393 |
Posted today: | 2 |