Software Development and Programming Careers (Official Discussion Thread)

Ethnic Vagina Finder

The Great Paper Chaser
Joined
May 4, 2012
Messages
56,526
Reputation
2,800
Daps
159,960
Reppin
North Jersey but I miss Cali :sadcam:
I think he is using AES as-is but without traditional key exchange (so independent generation) and that is the part that he has invented. Also the stuff to get around legal restrictions.



Inference by virtue of what has been proven about the libs/algs he is using (not developed).

I agree that it might be useful to get a security expert to have a look at his system.

And then another to look at his infrastructure.

it doesn't use AES at all. As previously stated, it's something I invented. Now the app does have an AES encryption tool that you can use to encrypt files on your computer. But the email feature doesn't use it. I wanted to create something that could be potentially patentable.
 

null

...
Joined
Nov 12, 2014
Messages
33,180
Reputation
6,410
Daps
51,374
Reppin
UK, DE, GY, DMV
it doesn't use AES at all. As previously stated, it's something I invented. Now the app does have an AES encryption tool that you can use to encrypt files on your computer. But the email feature doesn't use it. I wanted to create something that could be potentially patentable.

you invented your own encryption algorithm? so you do not use third party libs to implement the number crunching (at any level) for your encryption?

i am not talking about the transmission etc. i mean taking clear text to digest to encoding.
 

Ethnic Vagina Finder

The Great Paper Chaser
Joined
May 4, 2012
Messages
56,526
Reputation
2,800
Daps
159,960
Reppin
North Jersey but I miss Cali :sadcam:
seeds i guess. calculable, transient and in memory .. but replayable. you have login, machine specifics, password ..

It's loosely along those lines. I had to figure out a system that would be idiot proof, yet secure. It took me about a month to perfect the concept. Another 2 months to build it. But once all of the code was written, it wasn't testable. The concept was flawed. So then I came up with a different iteration, but the it had the same flaw. Then I found a solution that fit, added it and it worked.


At this point, the hardest part has been building the actual email client. When I showed a proof of concept I build a basic email client with minimum functionality and zero features. I've learned that building a full fledged email client is very nuanced and time consuming. I just learned about oAuth logins for example.
 

null

...
Joined
Nov 12, 2014
Messages
33,180
Reputation
6,410
Daps
51,374
Reppin
UK, DE, GY, DMV
Yeah. 7 files and 2,581 lines of code.

No third party lib to encrypt at all? If so and if what you say is true, approach a university and collect your PhD.

For example:

"The RSA (Rivest–Shamir–Adleman) cryptosystem is a family of public-key cryptosystems, one of the oldest widely used for secure data transmission. The initialism "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly described the algorithm in 1977.[1][2][3] "

 

null

...
Joined
Nov 12, 2014
Messages
33,180
Reputation
6,410
Daps
51,374
Reppin
UK, DE, GY, DMV
Are you referring to package imports in the file?

a discussion about what you have done isn't really about imports per-se.

imports are just an artefact of the mechanics of language visibility and build unit translation.

i.e. you can have imports which are not used, right?

my question is what implements your encryption logic? you seem to be saying that you have done it all by yourself, at all levels from clear text to digest to encoding.

if so, that is PhD level work.
 

Ethnic Vagina Finder

The Great Paper Chaser
Joined
May 4, 2012
Messages
56,526
Reputation
2,800
Daps
159,960
Reppin
North Jersey but I miss Cali :sadcam:
a discussion about what you have done isn't really about imports per-se.

imports are just an artefact of the mechanics of language visibility and build unit translation.

i.e. you can have imports which are not used, right?

my question is what implements your encryption logic? you seem to be saying that you have done it all by yourself, at all levels from clear text to digest to encoding.

if so, that is PhD level work.

:jbhmm: How can I explain this...

So It started with an idea. I used several AI prompts to find out if it was feasibly possible. So I took basic concepts and techniques and combined them into one system (algorithm). So think of it as a chain link.. or better yet a puzzle. Each peace by itself or a few pieces connected together are useless. But combined they create a puzzle that's bullet proof, fire proof, nuke proof. The end result is a new way to encrypt messages and send.

The first 8 attempts failed. Wasn't even close. And it got to the point where the AI prompts I used didn't work.
 

null

...
Joined
Nov 12, 2014
Messages
33,180
Reputation
6,410
Daps
51,374
Reppin
UK, DE, GY, DMV
:jbhmm: How can I explain this...

So It started with an idea. I used several AI prompts to find out if it was feasibly possible. So I took basic concepts and techniques and combined them into one system (algorithm). So think of it as a chain link.. or better yet a puzzle. Each peace by itself or a few pieces connected together are useless. But combined they create a puzzle that's bullet proof, fire proof, nuke proof. The end result is a new way to encrypt messages and send.

The first 8 attempts failed. Wasn't even close. And it got to the point where the AI prompts I used didn't work.

my question was more of a yes/no but that's ok. i'm not sure that you understood my question.

it seems that you are building some sort of chain where each block is shuffled using information from the block in front of it. a merkle tree of data and order 1 so to speak.

have a look at the details of turing (bombe, enigma) for some code breaking background.

 

Ethnic Vagina Finder

The Great Paper Chaser
Joined
May 4, 2012
Messages
56,526
Reputation
2,800
Daps
159,960
Reppin
North Jersey but I miss Cali :sadcam:
my question was more of a yes/no but that's ok. i'm not sure that you understood my question.

it seems that you are building some sort of chain where each block is shuffled using information from the block in front of it. a merkle tree of data and order 1 so to speak.

have a look at the details of turing (bombe, enigma) for some code breaking background.



I actually drew inspiration from the enigma machine. So it has some elements. But to get it to where I needed it to be it wasn’t enough. It was too complicated and required tech savvy users to even use it. With the first iteration it required both the sender and receiver to have the same settings
 
Top