Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Cryptography [PART I]

Name: Cryptography 2012-10-16 22:36

Cryptography

Name: Anonymous 2012-11-03 16:38

>>160
Seems too obscure. But if you are a musician that makes recordings, it makes sense to use a lossless encoding for the original.
Exactly.  Just record yourself playing whatever musical instrument as a raw file.

Name: Anonymous 2012-11-03 16:40

>>160
FLAC? Obscure? How old are you? Have you reached triple digits yet?

Name: Anonymous 2012-11-03 16:43

>>162
To the average person that doesn't know the difference between wav and mp3, I think flac would be obscure. Why is my age relevant and why would it mater if my age is greater than or equal to 100 (assuming you are referring to the base 10 representation of my age)?

Name: Anonymous 2012-11-03 18:25

The age and permissions of UNIX beards are expressed in octal numbers.

Name: Anonymous 2012-11-03 18:26

>>163
kike

Name: Anonymous 2012-11-03 18:31

>>165
Imbecilic illogical racist shithead.  Tsk.

Name: Anonymous 2012-11-03 22:46

>>166
African-Jewish nigger.

Name: Anonymous 2012-11-04 1:53

So, does anyone have links to steganalysis tools?

Name: Anonymous 2012-11-04 1:10

It's sad how a perfectly good crypto thread got derailed by stego kiddies.
Let's talk about SHA3 instead. Should Skein have won?

Name: Anonymous 2012-11-04 1:30

>>169
It's sad how a perfectly good crypto thread got derailed by stego kiddies.
Eat shit and die, retard.

Name: Anonymous 2012-11-04 4:15

Fun fact: any cryptographic hash can be turned into a symmetric cipher.

Name: Anonymous 2012-11-04 5:01

>>171
any symmetric cipher can be turned into a cryptographic hash function

Name: Anonymous 2012-11-04 16:00

Fun fact: There are currently no usable asymmetric ciphers based on problems whose intractability has been formally proven (e.g. any NP-hard or -complete problem).

Name: Anonymous 2012-11-04 16:40

>>173
NTRUEncrypt is based on the lattice problem, and the McEliece cryptosystem on decoding linear codes. Both problems are known to be NP-hard. McEliece is kind of broken as it stands, but NTRU is fine (if patent-encumbered in the US).

But the fact that integer factorization and the discrete log problem aren't NP-hard doesn't mean they're tractable.

Name: Anonymous 2012-11-05 1:04

My dick is NP-hard, maybe we should use that?

Name: Anonymous 2012-11-05 5:54

Cretins, all of you.
Die in a fire.
My essential rights to use free, non-cluttered by binary blobs software shall not be curtained.

Name: Anonymous 2012-11-05 5:56

>>176
FUCK OFF AND EDfdsdsa lkjfds alkfhfdslkhlkhlkjdsah  I FUCKING HATE YOU FEMINAZI FAGSHIT I FUCK HATE YOU

Name: Anonymous 2012-11-05 5:57

>>176
DIE IN A FIRE YOU IDIOTIC NAZI CRETIN. GO SUCK AHMED'S AUTHORITARIAN DICK.

Name: Anonymous 2012-11-05 6:01

>>178
People of Iraq were invaded murdered humiliated robbed and now live without clean water medicine while watching Jewish pigs occupying their land and robbing the only thing that could make them a real country, this is just so criminal so sick corrupting imoral i cant believe, i would blow myself too if Jews did this to my country who cares if they call anyone terrorist their media is a lie.

Name: Anonymous 2012-11-05 6:02

>>179
It is unlikely that you have the flexibility required to effectively blow yourself.

Name: Anonymous 2012-11-05 6:03

>>179
If Iraqis (Arabs, shias, sunnis, Kurds, and Turkmens) had been united, they would have easily defeated terrorist American Jews with little effort.

Name: Anonymous 2012-11-05 6:06

>>181
Iraqis got what they deserved, they're stupid, tracherous and lazy people. You leaders reflects your society. Iraq traitors who plotted to overthrow Saddam, I hope your proud what sewer your country has become. Iraqis deserve no respect.

Name: Anonymous 2012-11-05 6:11

Israel hopes to colonize parts of Iraq as “Greater Israel”

Israeli expansionists, their intentions to take full control of the West Bank and the Gaza Strip and permanently keep the Golan Heights of Syria and expand into southern Lebanon already well known, also have their eyes on parts of Iraq considered part of a biblical “Greater Israel”.

Israel reportedly has plans to relocate thousands of Kurdish Jews from Israel, including expatriates from Kurdish Iran, to the Iraqi cities of Mosul and Nineveh under the guise of religious pilgrimages to ancient Jewish religious shrines. According to Kurdish sources, the Israelis are secretly working with the Kurdistan Regional Government (KRG) to carry out the integration of Kurdish and other Jews into areas of Iraq under control of the KRG.

Kurdish, Iraqi Sunni Muslims, and Turkmen have noted that Kurdish Israelis began to buy land in Iraqi Kurdistan, after the U.S. invasion in 2003, that is considered historical Jewish “property”.

Name: Anonymous 2012-11-05 6:11

>>183
The Israelis are particularly interested in the shrine of the Jewish prophet Nahum in al Qush, the prophet Jonah in Mosul, and the tomb of the prophet Daniel in Kirkuk. Israelis are also trying to claim Jewish “properties” outside of the Kurdish region, including the shrine of Ezekiel in the village of al-Kifl in Babel Province near Najaf and the tomb of Ezra in al-Uzayr in Misan Province, near Basra, both in southern Iraq’s Shia-dominated territory. Israeli expansionists consider these shrines and tombs as much a part of “Greater Israel” as Jerusalem and the West Bank, which they call “Judea and Samaria”.

Name: Anonymous 2012-11-05 6:27

Cultural artifacts are a sensitive issue in Iraq. Following the U.S. invasion of the country in 2003, when looting and chaos broke out in the country, museums were robbed and thousands of items chronicling some 7,000 years of civilization in Mesopotamia were taken.

Name: Anonymous 2012-12-04 0:27

>>176-185
Why did you kill this thread?

Name: Anonymous 2012-12-04 1:07

Dude, this is totally not egin.

Name: Anonymous 2012-12-04 1:11

quit eggin them on
check em

Name: Anonymous 2012-12-04 1:33

>>188
egg my doubles?

Name: Anonymous 2012-12-04 17:47

I want to be an expert cryptographer
What's an Abelson great book to read?
I can program in C and make loud farts.
Thank you, /prog/

Name: Anonymous 2012-12-05 0:55

>>190
Applied Cryptography. There's two books by the same name, one by The Bruce Schneider, and one by whogivesashit. Read both.

Name: Anonymous 2012-12-05 2:35

>>110
wait what? crypto hides data using advanced college-level math, stego hides the existence of data. how are they unrelated?

Name: Anonymous 2012-12-05 11:13

>>191

But it's from 1996. Hasn't cryptography developed a lot since then?

Name: Anonymous 2012-12-05 12:21

>>193
No.

Name: Anonymous 2012-12-05 12:37

>>193

Triple DES — 1998
WEP — 1999
Yarrow algorithm — 1999
AES — 2001
SHA-2 — 2001
Diffie–Hellman key exchange — 2002
WPA/WPA2 — 2003/2004

etc.

Name: Anonymous 2012-12-05 21:04

>>191
Schneider

Name: Anonymous 2012-12-05 23:06

>>195
Interesting, the birth of AES corresponds with the end of the debate on cryptographic regulation in most non fucktarded countries.

Name: Anonymous 2012-12-06 0:02

steganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptography

Name: Anonymous 2012-12-06 0:13

>>47
for decryption, one would have to try every steg encoding scheme against every private key in storage.
That was Ruby as Fuck!

Name: Anonymous 2012-12-06 1:31

>LeeEEEEEEEEEEEeeeeeeEEELLLLLLLLLLLLLLLLLLLLLLLLllll
>le egin

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List