LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Security (http://www.linuxquestions.org/questions/linux-security-4/)
-   -   Polymorphic Encryption Systems - What do you think? (http://www.linuxquestions.org/questions/linux-security-4/polymorphic-encryption-systems-what-do-you-think-753531/)

konsolebox 09-08-2009 07:04 AM

Polymorphic Encryption Systems - What do you think?
 
Just made a post on blogger. It discusses my new idea about encryption. What do you think?

http://konsolebox.blogspot.com/2009/...ncryption.html

kbp 09-08-2009 07:58 AM

Hi konsolebox,

I don't see how randomness can fit in to the scheme, for example password hashes -

If the method to create the password hash in the first instance had random elements thrown in, how could 'login' for example obtain a matching hash? The process to generate that hash needs to be known and repeatable, no ?

cheers

kbp

konsolebox 09-08-2009 08:23 AM

Quote:

Originally Posted by kbp (Post 3674241)
Hi konsolebox,

I don't see how randomness can fit in to the scheme, for example password hashes -

If the method to create the password hash in the first instance had random elements thrown in, how could 'login' for example obtain a matching hash? The process to generate that hash needs to be known and repeatable, no ?

cheers

kbp

It's not random.. the generated sequence can be based on a variable text like the password. It's also not for one-way hashes but for symmetrical encryption of plain texts (unencrypted data).

Cheers too, konsolebox

edit: I didn't mention in the text but even though I focused the discussion on symmetrical encryption, I think the concept can also be applied with one-way encryptions or hashes.

JulianTosh 09-08-2009 08:43 AM

These ideas have already been done.

The first part of your blog describes what has been done by TrueCrypt. The program TrueCrypt allows a user to pick and choose multiple types of encryption and hashing algorithms to use on the master key. When a user types in a password, the program literally tries every combination of encryption and hashing algorithms and supplied password to attempt to decrypt the master key. Once it's successful, by detecting a known plaintext within the volume/headers, decryption of the volume can proceed.

The last part of your blog reminds me of the movie Contact. Where the aliens broadcast instructions on how to build a "contact device". The instructions are delivered in two dimensional "pages". They are only able to understand the instructions when they notice small markings on each edge of the documents and realize the documents must be assembled into 3 dimensions, as instructed by the edge markings (i.e. connect this edge of this page to the edge of the other page, etc).

konsolebox 09-08-2009 09:27 AM

Quote:

Originally Posted by Admiral Beotch (Post 3674293)
These ideas have already been done.

The first part of your blog describes what has been done by TrueCrypt. The program TrueCrypt allows a user to pick and choose multiple types of encryption and hashing algorithms to use on the master key. When a user types in a password, the program literally tries every combination of encryption and hashing algorithms and supplied password to attempt to decrypt the master key. Once it's successful, by detecting a known plaintext within the volume/headers, decryption of the volume can proceed.

Thanks for the reply. IMO it's only similar but not really much alike as the TrueCrypt as the sequences here are randomly generated based from a text like the password and it's not chosen by the user.

Quote:

The last part of your blog reminds me of the movie Contact. Where the aliens broadcast instructions on how to build a "contact device". The instructions are delivered in two dimensional "pages". They are only able to understand the instructions when they notice small markings on each edge of the documents and realize the documents must be assembled into 3 dimensions, as instructed by the edge markings (i.e. connect this edge of this page to the edge of the other page, etc).
Nice one. :). Yeah I watched the movie and it's beautiful.


All times are GMT -5. The time now is 01:00 PM.