[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
> Algorithm: Select bit-groups of random length from the file until the file is
> completely processed. Shuffle the bits in each group randomly and
> save each group back to the file. Repeat if needed using different
> key-strings for each successive encryption, for increased security.
You pay no attention whatsoever to key distribution, the fact that
this is just a form of permutation and no substitution is used, also
how do you account for the fact that the user`s random number source
may not be strong, even recognized rng`s like the keyboard latency
routines in pgp grind to a halt when faced with a hardware
perculiarity like a keyboard buffer etc...
Datacomms Technologies web authoring and data security
Paul Bradley, [email protected]
"Don`t forget to mount a scratch monkey"
-----BEGIN PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----