[25657] in cryptography@c2.net mail archive
Re: the meaning of linearity, was Re: picking a hash function to be encrypted
daemon@ATHENA.MIT.EDU (Travis H.)
Mon May 15 17:35:43 2006
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 15 May 2006 16:11:23 -0500
From: "Travis H." <solinym@gmail.com>
To: "leichter_jerrold@emc.com" <leichter_jerrold@emc.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <Pine.SOL.4.61.0605151459160.8990@mental>
On 5/15/06, leichter_jerrold@emc.com <leichter_jerrold@emc.com> wrote:
> Other than post by a guy - Terry someone or another - on sci.crypt
> a number of years ago - I've never seen any work in this direction.
> Is there stuff I'm not aware of?
That would probably be Terry Ritter, www.ciphersbyritter.com.
He calls this function Dynamic Substitution:
http://www.ciphersbyritter.com/#DynSubTech
You could also probably use a Latin square:
http://www.ciphersbyritter.com/#BBMTech
--=20
"Curiousity killed the cat, but for a while I was a suspect" -- Steven Wrig=
ht
Security Guru for Hire http://www.lightconsulting.com/~travis/ -><-
GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com