Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 42 |
Nodes: | 6 (0 / 6) |
Uptime: | 01:26:43 |
Calls: | 220 |
Calls today: | 1 |
Files: | 824 |
Messages: | 121,541 |
Posted today: | 6 |
23831363733383736343339323531363832333934373135393537313238343336313433373536393''.join([hex(ord(c))[2:] for c in n]) '3231343936333538373736383531323334393533393834373136323332313637353839343439353
from textwrap import wrap; ''.join([chr(int(n, 16)) for n in wrap(''.join([hex(ord(c))[2:] for c in n]), 2)]) '214963587768512349539847162321675894495281673876439251682394715957128436143756928'
h = ''.join([hex(ord(c))[2:] for c in n])
from textwrap import wrap
''.join([chr(int(n, 16)) for n in wrap(h, 2)]) '214963587768512349539847162321675894495281673876439251682394715957128436143756928'
A new idea to solve the problem with a secret (well, now not so secret)
code scheme, one that you don't have to keep hiding. Here we can hide it
in plain sight. :)
Go here, It's a Sudoku game:
And key source can also be obsfucated somewhat, in that one could
combine the numbers in a pattern (zig-zag, circular, etc., i.e.,
anything other than left to right top to bottom).
http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=4719759cad9265f6f38ec25a7fbec19144df819e9f049d87a016c43a86c864c66366e5162872b616a579549433dbcb93fa5d17601e6f8e9c6eb9c34ff0884362a13437d0d0714f18f8ff2ab75a37a4ee
On Thu, 20 Jun 2024 19:16:00 -0700, Chris M. Thomasson wrote:
http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=4719759cad9265f6f38ec25a7fbec19144df819e9f049d87a016c43a86c864c66366e5162872b616a579549433dbcb93fa5d17601e6f8e9c6eb9c34ff0884362a13437d0d0714f18f8ff2ab75a37a4ee
I don't get it.
Decrypted: <<< that...
No shit! Thanks. <<< this...
On Thu, 20 Jun 2024 20:45:24 -0700, Chris M. Thomasson wrote:
... generating a
complex password from a simple password...
Op 22-6-2024 om 10:54 schreef Richard Harnden:
On 21/06/2024 21:31, Chris M. Thomasson wrote:
... generating a
complex password from a simple password...
You can't actually increase the entropy
Perhaps, but the recent discussions here seem to boil down to "password
based key derivation functions" which may frustrate bruteforce attacks a
bit.
On 6/21/2024 3:01 PM, Rich wrote:
Cri-Cri <cri@cri.cri.invalid> wrote:
On Thu, 20 Jun 2024 20:45:24 -0700, Chris M. Thomasson wrote:
Chris very much so likes to "insert" his hmac cipher into every
discussion thread, even those where it is off topic (although the
off-topicness is questionable here....).
He did this so much that Richard Heathfield killfiled him a couple
years back after having become frustrated with his "insertions" (among
other things).
Ahhh, the open secret... I gave away too many of my experiments. He got pissed.
On 6/22/2024 9:09 AM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
On 6/21/2024 3:01 PM, Rich wrote:
Cri-Cri <cri@cri.cri.invalid> wrote:
On Thu, 20 Jun 2024 20:45:24 -0700, Chris M. Thomasson wrote:
Chris very much so likes to "insert" his hmac cipher into every
discussion thread, even those where it is off topic (although the
off-topicness is questionable here....).
He did this so much that Richard Heathfield killfiled him a couple
years back after having become frustrated with his "insertions" (among >>>> other things).
Ahhh, the open secret... I gave away too many of my experiments. He got
pissed.
More accurately, you *hijacked* too many threads to insert your hmac
cipher into them, and then did not listen and crucially, *adjust your
behavior in the face of negative feedback* about your doing so, with
the result that he got tired of the hijacking and killfiled you.
Oh. I do remember him getting pissed off about me talking to much about
my progress with SCOS.
Oscar <oxxxxxxxxxxxs@gmail.com> wrote:
Op 22-6-2024 om 10:54 schreef Richard Harnden:
On 21/06/2024 21:31, Chris M. Thomasson wrote:
... generating a
complex password from a simple password...
You can't actually increase the entropy
Perhaps, but the recent discussions here seem to boil down to "password based key derivation functions" which may frustrate bruteforce attacks a bit.
The thread has kind of drifted in that direction. It began as a way to
try to "remember" a complex password by encoding it as "something else"
such that one might not need to worry should the stazi examine your
papers and find the "something else" in your possession.