Quasi Functions / Polymorphic Encryption

BM-2cTzdKMSJVFvuT9hhtaut8XPg4gn3LAm1b
Jan 23 16:05

Abstract From the beginning of the electronic era in cryptography the main block-cipher design model had stayed the same, the concept of mixing substitution and transposition. Differential cryptanalysis and Liner cryptanalysis are applicable on the majority of the Feistel-Network based ciphers, and they have, at least in theory, shown the weakness of this model. There is a growing disparity between the ability to design secure ciphers and the cryptanalysis. This indicates that block cipher design converge to “maximum secure cipher”. Polymorphic Encryption and the Quasi Function theory are a concept how to design a cipher having the properties of a Maximum Secure Cipher. The new design paradigm is KEY=ENCRYPTION ALGORITHM, ciphers designed in a way that each key present a different encryption algorithm. http://kbajalc.tripod.com/algo/pme/polym.html

[chan] Crypto-Anarchist Federation
BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v

Subject Last Count
Hardware trojans... Feb 25 18:53 6
Integrated Circuits (ASICs) and FPGA "lab attack" Trojan Detection using IC fingerprinting. Feb 25 11:13 1
Tor / Proxychains is leaking my hostname Feb 23 08:31 3
@S3 ... SPOOQKE ... Secure Pair Orthogonal OTP Quantum Key Exchange Feb 22 14:04 2
Compress Random Data Feb 19 06:34 5
Your Mama 1$ §çÛM Feb 18 20:58 1
A satellite engineer explains the truth about satellite operations Feb 18 18:16 3
Satellites Are Fake - Just Another NASA Hoax Feb 18 17:27 1
Globewashing Feb 18 07:37 1
how to make bitmessage secure Feb 18 04:59 1
Are you blacklisted? Feb 18 01:49 1
Mitigating exploited software with firejail Feb 18 01:45 1
MeinCoin Crypto Research - Screenshot Feb 17 13:16 1
Constant Conflict - First published From Parameters, Summer 1997, pp. 4-14: US Army War College] Feb 17 08:28 3
FPGA Hardware backdoors news. Feb 17 08:21 1
Consider this problem. Feb 17 07:10 1
How many users have bitmessage in the world? Feb 16 20:25 2
test 44 Feb 16 19:14 5
$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist Feb 16 03:08 1
Bitmessage components security seclusion example Feb 16 01:05 1
NOTICE: Address Revocation Feb 15 02:49 1
Truly, truly, Bitcoin is a failure Feb 13 12:22 1
Proof of Work is the worst way to do a BlockChain Feb 13 12:10 1
privacy software / services list Feb 11 19:18 5
THE WORLD'S MOST SECURE MESSAGING SYSTEM Feb 10 11:07 1
If I use P2P networks like eMule on the Whonix operating system, is it possible for them to leak my real IP address? Feb 10 08:06 2
hacker for hire Feb 10 02:26 1
a Feb 9 21:21 1
z Feb 9 21:21 1
test1 Feb 9 20:25 3
ZRe: test5 Feb 9 12:51 1
aRe: test5 Feb 9 12:51 1
my pleasure Feb 8 17:06 1
Anonymous VCS Feb 6 15:13 5
The best descriptions of trolls and idiots Feb 6 12:57 2
crypto question Feb 6 12:39 1
since leaving general chan Feb 6 12:16 3
Help Fight Government Tyranny Feb 6 02:04 1
[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L Feb 5 11:53 1
Crypto-Anarchist Literature Feb 4 11:19 1
Help needed with identying crypto paper Feb 1 12:25 1
OMEGA user survey Feb 1 03:34 2
What is secure? Jan 29 05:15 14
An Inside Job: Remote Power Analysis Attacks on FPGAs Jan 29 00:02 1