public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Austin S Hemmelgarn <ahferroin7@gmail.com>
To: Ismail Kizir <ikizir@gmail.com>, Clemens Ladisch <clemens@ladisch.de>
Cc: Pavel Machek <pavel@ucw.cz>, linux-kernel@vger.kernel.org
Subject: Re: A new, fast and "unbreakable" encryption algorithm
Date: Fri, 4 Dec 2015 10:28:02 -0500	[thread overview]
Message-ID: <5661B102.5080608@gmail.com> (raw)
In-Reply-To: <CAFJyfaMN3-Rn_sDcLKHUszn6Yn39DK-JB0U85BDtRNPiQKh-yw@mail.gmail.com>

[-- Attachment #1: Type: text/plain, Size: 3386 bytes --]

On 2015-12-04 04:42, Ismail Kizir wrote:
> Clemens,
>
> You really don't know what you are talking about. Don't you? :)
> And this is my last mail about the subject. I don't want to keep the list busy.
> The original, unencrypted "plaintext" file was all zeroes.
> When I uploaded to blogspot, it appeared all "red" and it still is.
> And it has not any "red" cyphertext :)
> http://ismail-kizir.blogspot.com.tr/2015/11/visual-proofs-of-hohha-dynamic-xor.html
It looks a lot more like you don't know what your talking about.  Human 
perceptions of 'randomness' do not align with actual mathematical 
definitions of it.  From a mathematical standpoint, 'random' means that 
given any arbitrary number of previous values, it is impossible to 
predict what the next value will be.

An excellent example of something that 'looks random' to a human but 
really isn't is machine code.  To anyone who's never dealt with it, it 
looks just like a jumble of bytes.  To someone who has dealt with it, 
it's pretty easy to predict certain patterns, and if you know what to 
lock for, you can even tell to a certain extent what type of processor 
it's for (for example, machine code for the MSP430 tends to have lots of 
0x4303 words in it, because that's the translation of a NO-OP).  Try 
importing an executable file into Gimp or Krita as a raw image, you'll 
see definite patterning in a couple of places, but most of it will look 
like static.  Similarly, do the same but with an audio import into 
something like Audacity, you'll get a mix of silence and static with a 
handful of odd fixed frequency tones mixed in.  Both of these seem 
perfectly random to most people, but they really aren't, they just seem 
that way because the structure of the data doesn't fit in the context in 
which it's being viewed.

I've run essentially the same tests that Clemens did, and got the same 
results, and as such agree with him and Pavel.  Given the output, it's 
trivially possible to infer the input in a given set of cases, and given 
that, it's not unreasonable to assume that it's possible to directly 
infer the input in any arbitrary case.  Saying that it's a good 
encryption algorithm because the output looks different than the input 
is not a valid argument, you have to do a proper analysis of the output, 
which means more than just encrypting a bitmap and seeing if you can 
recognize a pattern in the result. The algorithm is of little practical 
use beyond the type of thing that ROT13 or a Caesar cipher would be used 
for (IOW, I might consider using it to obfuscate something to annoy 
someone who's just being nosy, but I would not by any means trust it for 
anything that I wanted protected from unauthorized access).
>
> On Fri, Dec 4, 2015 at 9:34 AM, Clemens Ladisch <clemens@ladisch.de> wrote:
>> Ismail Kizir wrote:
>>> What means "did not look random"?
>>
>> A plaintext consisting of repeated bytes (zero, or other values)
>> eventually makes your algorithm go into a loop, which results in
>> repeated bytes.
>>
>>> On the pictures, there is also an example of "full 0"(it appears red,
>>> but it is full 0 bmp) example.
>>> And it "looks" perfectly random.
>>
>> No, red is _not_ perfectly random.  When I see a red picture, I have
>> evidence that the plaintext was zeroes.
>>
>>
>> Regards,
>> Clemens



[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 3019 bytes --]

  reply	other threads:[~2015-12-04 15:32 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-11-18  5:25 A new, fast and "unbreakable" encryption algorithm Ismail Kizir
2015-11-18 16:33 ` Harald Arnesen
2015-11-18 20:11   ` Ismail Kizir
2015-11-19  9:05     ` Clemens Ladisch
2015-11-21  6:31       ` Ismail Kizir
2015-12-03 22:35         ` Pavel Machek
2015-12-03 22:38           ` Ismail Kizir
2015-12-04  7:34             ` Clemens Ladisch
2015-12-04  9:42               ` Ismail Kizir
2015-12-04 15:28                 ` Austin S Hemmelgarn [this message]
2015-11-19  2:35   ` Ismail Kizir
2015-11-19 12:12 ` Łukasz Stelmach
2015-11-19 12:31   ` Ismail Kizir
2015-11-19 14:04     ` Łukasz Stelmach
2015-11-19 14:05     ` Ismail Kizir

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5661B102.5080608@gmail.com \
    --to=ahferroin7@gmail.com \
    --cc=clemens@ladisch.de \
    --cc=ikizir@gmail.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pavel@ucw.cz \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox