Sujet : Re: AI's take on my cipher...
De : chris.m.thomasson.1 (at) *nospam* gmail.com (Chris M. Thomasson)
Groupes : sci.cryptDate : 06. Jul 2025, 23:20:08
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <104esqo$2fdr8$1@dont-email.me>
References : 1 2
User-Agent : Mozilla Thunderbird
On 7/6/2025 11:41 AM, Stefan Claas wrote:
Chris M. Thomasson wrote:
>
This is from Grok here wrt the following content:
[...]
Let's face it, nobody in the world would use your
webpage ciper in production, because security aware
people use encryption offline.
Keep in mind that it's client only. You can download the page, turn the internet off and use it fine. I just thought it would be fun to be able to create links with ciphertext payloads.
So why are you still
promoting your cipher here, instead of using minicrypt,
which I asked you to test on Windows?
Do you realize how busy I have been lately? Check out this 3d field, fly around when you get bored:
https://skfb.ly/pyP9EPromoting it? Well yeah in a sense. For a certain reason... I just want it to be heavily attacked and broken by some clever person. That would be neat to me! Why would I use minicrypt? Has it went through proper and extensive crypt analysis? Btw, I never used GO.
Basically, I like several properties of my experimental cipher. No ciphertext has any data sent in the clear. Aka, no IV, no sequence numbers, ect... A ciphertext is also bit sensitive. Any alteration to the ciphertext will make it decrypt into random garbage. Each encryption of a plaintext will be radically different.