[25657] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: the meaning of linearity, was Re: picking a hash function to be encrypted

daemon@ATHENA.MIT.EDU (Travis H.)
Mon May 15 17:35:43 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 15 May 2006 16:11:23 -0500
From: "Travis H." <solinym@gmail.com>
To: "leichter_jerrold@emc.com" <leichter_jerrold@emc.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <Pine.SOL.4.61.0605151459160.8990@mental>

On 5/15/06, leichter_jerrold@emc.com <leichter_jerrold@emc.com> wrote:
> Other than post by a guy - Terry someone or another - on sci.crypt
> a number of years ago - I've never seen any work in this direction.
> Is there stuff I'm not aware of?

That would probably be Terry Ritter, www.ciphersbyritter.com.

He calls this function Dynamic Substitution:
http://www.ciphersbyritter.com/#DynSubTech

You could also probably use a Latin square:
http://www.ciphersbyritter.com/#BBMTech
--=20
"Curiousity killed the cat, but for a while I was a suspect" -- Steven Wrig=
ht
Security Guru for Hire http://www.lightconsulting.com/~travis/ -><-
GPG fingerprint: 9D3F 395A DAC5 5CCC 9066  151D 0A6B 4098 0C55 1484

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post