Logo by Cyclops - Contribute your own Logo!

END OF AN ERA, FRACTALFORUMS.COM IS CONTINUED ON FRACTALFORUMS.ORG

it was a great time but no longer maintainable by c.Kleinhuis contact him for any data retrieval,
thanks and see you perhaps in 10 years again

this forum will stay online for reference
News: Follow us on Twitter
 
*
Welcome, Guest. Please login or register. April 20, 2024, 01:14:47 AM


Login with username, password and session length


The All New FractalForums is now in Public Beta Testing! Visit FractalForums.org and check it out!


Pages: [1] 2   Go Down
  Print  
Share this topic on DiggShare this topic on FacebookShare this topic on GoogleShare this topic on RedditShare this topic on StumbleUponShare this topic on Twitter
Author Topic: Fractal encryption  (Read 7297 times)
0 Members and 1 Guest are viewing this topic.
DarkBeam
Global Moderator
Fractal Senior
******
Posts: 2512


Fragments of the fractal -like the tip of it


« on: October 23, 2015, 12:21:18 PM »

Found this in DeviantArt ... wink Chris is a forum member but I don't think he posted this (shy?) - but I like the idea so sorry but I wanted to share!
It is made for fun probably.
http://pastebin.com/Rjw3U7WK
Logged

No sweat, guardian of wisdom!
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #1 on: October 28, 2015, 08:28:21 AM »

FWIW, here is an online version of the algorithm:

http://funwithfractals.atspace.cc/ffe

And a link to a pre-alpha rough draft of a paper I am working on that will be ready before the end of the year:

https://drive.google.com/file/d/0BxAdjzJ5idDQRThtR1FXQ2tBbEk/view

And some further context:

https://groups.google.com/d/topic/sci.crypt/g6CPhD9mh24/discussion

https://groups.google.com/d/topic/sci.crypt/KH1A8KeWlvw/discussion
Logged
TheRedshiftRider
Fractalist Chemist
Global Moderator
Fractal Iambus
******
Posts: 854



WWW
« Reply #2 on: October 28, 2015, 12:26:24 PM »

Interesting way of encryption. I look forward to the final version.
Logged

Motivation is like a salt, once it has been dissolved it can react with things it comes into contact with to form something interesting. nerd
TheRedshiftRider
Fractalist Chemist
Global Moderator
Fractal Iambus
******
Posts: 854



WWW
« Reply #3 on: October 29, 2015, 11:50:58 AM »

Ive been experimenting with this encryption. (http://pastebin.com/0yJDTfu3)
I guess only single use of the encryption is intended but I tried it anyway.

I have encrypted the word ''fractal'' (obviously) with five iterations. The length of the row of characters gets doubled every time.

The repetion in the row of characters really resembles a fractal. There is a repetition for some parts of sequences but the longer the row of characters the less common the repetition gets.

Changing something in the fifth iteration does not necassarily mean that the decrypted word is going to be different.
« Last Edit: October 29, 2015, 12:07:12 PM by TheRedshiftRider » Logged

Motivation is like a salt, once it has been dissolved it can react with things it comes into contact with to form something interesting. nerd
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #4 on: November 01, 2015, 03:05:11 AM »

Interesting way of encryption. I look forward to the final version.

Thank you.

Funny Fractal Encryption online experiment...


I have made a small change in the online version of my cipher:

http://funwithfractals.atspace.cc/ffe

I made it far easier for a user to copy the ciphertext. Before, they would have to copy the
content of 4 text boxes comprising the public key, along with the ciphertext. This is a bitch!

So, I simply added the public key to the ciphertext and created a little parser that automatically
separates the public key from the ciphertext for decrypting.

Now a user can simply copy and paste ciphertext, and the public automatically comes along for the ride!

wink


For instance, here is some ciphertext encrypted with the default private key. To decrypt it, simply
copy-and-paste the following text into the “Ciphertext” text box, and click the decrypt button to see
the message:
_______________________________________________
-0.32833967893446225 0.06772234646207564
-0.06252863483583193 0.47056145733894683

F7 A0 16 B8 A3 0E AF ED 54 80 3D E7 9B 76 C8 0C 25 45
7E 31 6A 4B 44 4F 90 42 93 8C 8C 53 10 37 0B DF E7 E1 67
CF BD 33 D0 32 F5 0C 98 3C D4 6D 28 25 D0 C4 A9 58 B0
1B D1 98 EA 93 35 BC 08 79 5D 30 9A 83 3D F3 CE C0 0A
20 F0 38 E2 03 B6 72 63 03 AA 14 B3 F5 32 3F A6 3B 4A 30
CA A4 49 68 52 E2 F3 DA 4F 53 F7 65 30 D1 8E F4 7F 39 EB
C6 25 21 FE
_______________________________________________


You might have to hit reload, or do something to make sure you have the updated site. If you do not
see four floating point numbers in the ciphertext after the page loads, well, you are using the old version.


Thanks.
Logged
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #5 on: November 01, 2015, 03:17:33 AM »

Ive been experimenting with this encryption. (http://pastebin.com/0yJDTfu3)
I guess only single use of the encryption is intended but I tried it anyway.

I have encrypted the word ''fractal'' (obviously) with five iterations. The length of the row of characters gets doubled every time.

The repetion in the row of characters really resembles a fractal. There is a repetition for some parts of sequences but the longer the row of characters the less common the repetition gets.

Changing something in the fifth iteration does not necassarily mean that the decrypted word is going to be different.

Yes. The quality of ciphertext produced by the old, original program in the pastebin link posted by DarkBeam is poor
because the location in the fractal produces way too much symmetry. Also, it has no method of producing an
“avalanche” effect. This means that changing a single character in the plaintext will not alter the ciphertext, except
for a single character! This is NOT good.

I have fixed this in the online version. A small change in the plaintext makes radical changes to the ciphertext.

http://funwithfractals.atspace.cc/ffe

Does this work for you at all?
Logged
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #6 on: November 01, 2015, 03:28:50 AM »

Yes. The quality of ciphertext produced by the old, original program in the pastebin link posted by DarkBeam is poor
because the location in the fractal produces way too much symmetry. Also, it has no method of producing an
“avalanche” effect. This means that changing a single character in the plaintext will not alter the ciphertext, except
for a single character! This is NOT good.

I have fixed this in the online version. A small change in the plaintext makes radical changes to the ciphertext.

http://funwithfractals.atspace.cc/ffe

Does this work for you at all?

I would be GRATEFUL if you can try to find any potential problems with this online experimental version.

Can you see any nasty patterns that are simply eluding me?

Thank you.
Logged
TheRedshiftRider
Fractalist Chemist
Global Moderator
Fractal Iambus
******
Posts: 854



WWW
« Reply #7 on: November 01, 2015, 08:26:51 AM »

The first test:
http://pastebin.com/0yJDTfu3
The second test:
http://pastebin.com/9wrSQYyJ

The patterns are mostly the same. I guess it is difficult to reduce the patterns in higher iterations.

I ofcourse could have used the keys too. I'll try that now.
Logged

Motivation is like a salt, once it has been dissolved it can react with things it comes into contact with to form something interesting. nerd
TheRedshiftRider
Fractalist Chemist
Global Moderator
Fractal Iambus
******
Posts: 854



WWW
« Reply #8 on: November 01, 2015, 08:40:27 AM »

http://pastebin.com/fwYpxFPe

There are less patterns when using the key in the input. I thought it would be more difficult to decrypt but it works. smiley
Logged

Motivation is like a salt, once it has been dissolved it can react with things it comes into contact with to form something interesting. nerd
simon.snake
Fractal Bachius
*
Posts: 640


Experienced Fractal eXtreme plugin crasher!


simon.fez SimonSideBurns
« Reply #9 on: November 03, 2015, 11:42:59 PM »

Updated to reflect new version of the encoder.  Paste it in and press decrypt.

Code:
0.14297728274339186 0.14908253055244866
0.2181764303662015 0.31243856763146316

CD 0C 30 66 D8 98 E2 F6 6E 4F A8 41 40 CC 97 DC 3B FE 9D 8A 29 0D DA B7 13 2E E8 2E CA 98 15 84 E2 87 D8 F6 65 A5 AB F1 A2 F1 90 E4 DC 2C 2D 97 FB 9A 3A CD 4E 98 4B
« Last Edit: November 06, 2015, 10:09:13 PM by simon.snake » Logged

To anyone viewing my posts and finding missing/broken links to a website called www.needanother.co.uk, I still own the domain but recently cancelled my server (saving £30/month) so even though the domain address exists, it points nowhere.  I hope to one day sort something out but for now - sorry!
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #10 on: November 05, 2015, 10:51:51 PM »

The all wise Wizzofozz over on sci.crypt kindly point out a major limitation in the old site:

https://groups.google.com/d/msg/sci.crypt/h4lSsDswVbU/rRRGXyKoAgAJ

;^D

The key space was limited to a single Julia point, and changing the private key axes would not destroy a decrypt attempt... Here is an updated version of the pre-alpha version of the online tool I am currently working on:

http://funwithfractals.atspace.cc/ffe

(make sure to reload the site to get the fresh one: You should see a heckof a lot more settings!  wink)


Now, I ask you, beg of you, to try to create some plaintext, encrypt it and softly change the settings in the private key, and finally hit the decrypt button. Do you get the plaintext, or garbage? How sensitive can you get before a decrypt actually gains “some” of the plaintext? Keep in mind that damn garbage is the goal here wrt defending against hacks for Eve is so darn smart and elegant...  ;^)


I need some major help here with regard to “users”, or anybody who wants to tear the shi% out of this monstrosity I dared to put online.  wink


Any help, comments, criticisms are greatly appreciated. Actually, the more bad things you can find, the better: damn it!


I know the GUI is rather terrible, but try to focus on the cipher for now!

;^)


I need to get this done in conjunction with a paper I am writing. This will be done before the end of the year. I just have to dial out this online version, and use it as a reference within the paper...

;^o


Also, I made the rendering of the cipher image smaller, and better color. So, it should load much faster on a “small” device...
Logged
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #11 on: November 05, 2015, 10:52:41 PM »

BTW, I updated my experimental cipher webpage.

Unfortunately, the older cipher text contained in this thread is no longer compatible with it, for the public key format has been changed... In order to decrypt the old messages, one needs to download the old site:

https://drive.google.com/folderview?id=0BxAdjzJ5idDQWFJmdUNYNHJQc0E&usp=sharing

<edit>
The link above is for the original version that did not include the public key in the ciphertext itself!

This will not decrypt messages in this thread for they have public key! I am so sorry for pointing you all to the wrong version.

;/
</edit>


I hope the new site works for you. I also improved the color monitor on the visual cipher rendering... wink
« Last Edit: November 05, 2015, 11:05:46 PM by Chris Thomasson » Logged
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #12 on: November 05, 2015, 11:02:08 PM »

Here is the old site in an attached zip file.

* ffe_website_old.zip (7.37 KB - downloaded 308 times.)
Logged
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #13 on: November 20, 2015, 10:32:18 PM »

FWIW, here is a new command line version of the program
that can encrypt/decrypt any file. Something to try to break
for fun?  ;^)

http://pastebin.com/D7N4vBWa


I changed my terminology from “private/public key” to
secret key and salt respectively.

I hope this is okay!?  ;^o


In order to compile this code on GCC you need the (-std=c99)
flag and link with the math library (-lm). Something like:

gcc -std=c99 ffe.c -o ffe -lm


Now, once you get this compiled, assume the name of the program
is (ffe) and execute the following command line:

ffe 0 default_secret_key


This will create a file named (default_secret_key) that contains
an example/default key to work with. The numbers in the file can
be edited with a text editor: Just change the numbers and nothing
else or you will corrupt it! I am using the number of elements
returned from (scanf) to determine corruption in the files: This
can definitely be improved upon!


Now, create a new file called (plaintext), and fill it with
anything you want; use a movie file, or a bunch of (A)'s...

;^)



Then run the following command line:

ffe 1 default_secret_key plaintext ciphertext

that will encrypt plaintext into the file ciphertext.



Okay... Now we are going to decrypt the ciphertext file using the
following command line:

ffe 2 default_secret_key plaintext_compare ciphertext

that will create a new file called (plaintext_compare) that should
be identical to the original (plaintext) file.

You can follow all of the steps above online using the following
awesome site:

http://www.tutorialspoint.com/compile_c99_online.php

Can you compile it?

Do the command lines work for you?
Logged
Chris Thomasson
Conqueror
*******
Posts: 137



« Reply #14 on: December 01, 2015, 09:57:25 PM »

Has anyone tried to compile:

http://pastebin.com/D7N4vBWa

I need some help here wrt breaking/cracking this damn thing!

 shocked
Logged
Pages: [1] 2   Go Down
  Print  
 
Jump to:  


Powered by MySQL Powered by PHP Powered by SMF 1.1.21 | SMF © 2015, Simple Machines

Valid XHTML 1.0! Valid CSS! Dilber MC Theme by HarzeM
Page created in 0.191 seconds with 27 queries. (Pretty URLs adds 0.009s, 2q)