English Amiga Board


Go Back   English Amiga Board > Coders > Coders. General

 
 
Thread Tools
Old 25 July 2005, 11:32   #1
redblade
Zone Friend
 
redblade's Avatar
 
Join Date: Mar 2004
Location: Middle Earth
Age: 40
Posts: 2,127
Amiga Format Issue 12, Paul Overaa

Hi

There is a tutorial in AF issue 12 by Paul Overaa, a introduction to encryption on the amiga.

Can some one please scan this please.

Thanks.
redblade is offline  
Old 25 July 2005, 14:02   #2
Codetapper
2 contact me: email only!
 
Codetapper's Avatar
 
Join Date: May 2001
Location: Auckland / New Zealand
Posts: 3,182
I don't have that magazine but what exactly do you want the encryption information for? If it's just for your own project you can just do a basic XOR over the data and that would be enough to protect it from the majority of people.
Codetapper is offline  
Old 25 July 2005, 20:19   #3
girv
Mostly Harmless
 
girv's Avatar
 
Join Date: Aug 2004
Location: Northern Ireland
Posts: 1,109
Yeah what's it for? Different types of encryption are more suitable for different purposes so what you want will depend very much on what you are trying to achieve...
girv is offline  
Old 26 July 2005, 10:42   #4
alexh
Thalion Webshrine
 
alexh's Avatar
 
Join Date: Jan 2004
Location: Oxford
Posts: 14,337
I remember that Adobe 'Ebooks encryption used to be XOR the data with the string "ENCRYPTED". Some russian got into terrible trouble when he announced this
alexh is offline  
Old 27 July 2005, 12:47   #5
redblade
Zone Friend
 
redblade's Avatar
 
Join Date: Mar 2004
Location: Middle Earth
Age: 40
Posts: 2,127
what's it for?!?! it's a secret project :P.

Nah, I just wanna read it, yeah i've read that shit about XORing the data and stuff, but still wouldn't mind reading the article.
redblade is offline  
Old 27 July 2005, 14:07   #6
girv
Mostly Harmless
 
girv's Avatar
 
Join Date: Aug 2004
Location: Northern Ireland
Posts: 1,109
Quote:
what's it for?!?! it's a secret project :P.
A secret project or a project involving secrets ?

Quote:
Nah, I just wanna read it, yeah i've read that shit about XORing the data and stuff, but still wouldn't mind reading the article.
Actually I wouldn't mind either if anyone can oblige...
girv is offline  
Old 29 July 2005, 12:06   #7
redblade
Zone Friend
 
redblade's Avatar
 
Join Date: Mar 2004
Location: Middle Earth
Age: 40
Posts: 2,127
Okay

that's 2 people on the waiting list
redblade is offline  
Old 17 August 2005, 17:40   #8
Steve
I Identify as an Ewok
 
Steve's Avatar
 
Join Date: Jul 2001
Location: North Lincolnshire
Age: 45
Posts: 2,356
Big grin

I have the article but I don't have a scanner. However I've taken the time to copy the BASIC code at the end of the article to text so you can have a read of something. Enjoy!

Code:
File Encryption - A simple Example to give you the general idea.
---------------------------------------------------------------

NOTE 1: This example does not contain any error checking!
NOTE 2: I wouldn't recommend such a simple function for serious use but
        as an "easily understood" starting point it does serve a useful
        purpose. Once you understand the overall ideas you can experiment
        with more sophisticated functions.
NOTE 3: You can add all the bells and whistles you want, but the 
        basic idea is simply this...

OPEN SOURCE AND DESTINATION
READ AND PROCESS EACH CHARACTER IN THE SOURCE FILE WRITING EACH MODIFIED CHARACTER TO THE DESTINATION FILE
CLOSE SOURCE AND DESTINATION FILES

REM First step is to get the filenames and a "key" value.

INPUT "Source file?", SOURCE$
INPUT "Destination file?", DESTINATION$
INPUT "Encryption file?", Key

REM Open the file and initialise a position counter

OPEN "i",£1,SOURCE$: OPEN "o",£2,DESTINATION$: Position = 0

REM Now loop reading the source file byte by byte carrying out the
REM encryption function on each character and writing the encrypted
REM character to the destination file.

WHILE (NOT EOF(1))
	CHARACTER$ = INPUT$(1,£1):
	X = ASC (CHARACTER$) : Position = 1
	X = X XOR ((Key + Position) MOD 256) : PRINT£2,CHR$(X);:
WEND

REM Close the file and quit

CLOSE 1: CLOSE 2: END
Here is the magic line in the code which performs the encryption process:

X = X XOR ((Key + Position) MOD 256) : PRINT£2,CHR$(X);:

Last edited by Steve; 17 August 2005 at 17:48.
Steve is offline  
Old 17 August 2005, 18:49   #9
OddbOd
Registered User
 
Join Date: Jul 2005
Location: Australia
Age: 46
Posts: 666
Off Topic:
Quote:
Originally Posted by alexh
I remember that Adobe 'Ebooks encryption used to be XOR the data with the string "ENCRYPTED". Some russian got into terrible trouble when he announced this
That was Dmitry Sklyarov who was arrested under the provisions of the DMCA after the release DEF CON 9 conference, the case drew a lot of attention as it was the first time somebody had ever been arrested and charged under the Act. The funny part is that the XOR encryption is not even the weakest security handler that was used in eBooks (BTW the security system for eBooks is modular and Adobe did not write the handlers themselves) New Paradigm Resource Group used ROT13 "encryption" with a fixed key that was stored as plaintext in the security plugin and had the audacity to charge US$3000 per document.

On Topic:
In the listing above, aren't those pound signs (£) supposed to be pound signs (#) ?

Another thing, can anyone figure out what the Position variable is supposed to be for? It gets assigned one constant, then another, then....???

Last edited by OddbOd; 17 August 2005 at 18:55.
OddbOd is offline  
Old 17 August 2005, 23:00   #10
Galaxy
Registered User
 
Galaxy's Avatar
 
Join Date: May 2004
Location: Canberra, Australia
Age: 46
Posts: 1,417
Scanned and in the Zone - enjoy!

Last edited by Galaxy; 17 August 2005 at 23:19.
Galaxy is offline  
Old 18 August 2005, 02:19   #11
redblade
Zone Friend
 
redblade's Avatar
 
Join Date: Mar 2004
Location: Middle Earth
Age: 40
Posts: 2,127
Thanks Steve and Galaxy .

Galaxy, Is there a ISO you follow for scanning Amiga Tutorials?

I want to buy a scanner, so I can scan in my Amiga magazine Tutorials, because they are really useful.
redblade is offline  
Old 18 August 2005, 14:09   #12
Galaxy
Registered User
 
Galaxy's Avatar
 
Join Date: May 2004
Location: Canberra, Australia
Age: 46
Posts: 1,417
What do you mean by ISO?

There's nothing particularly special about the scans I made - they were scanned as greyscale and then converted to pdf.
Galaxy is offline  
Old 19 August 2005, 01:02   #13
redblade
Zone Friend
 
redblade's Avatar
 
Join Date: Mar 2004
Location: Middle Earth
Age: 40
Posts: 2,127
any particular DPI ?
redblade is offline  
Old 19 August 2005, 02:02   #14
Imran
Registered User
 
Join Date: Jul 2005
Location: nope
Posts: 39
300dpi is the standard for good readability and should suit most purposes, if you want to blow it up to a larger than life size then scan at a higher resolution.
Imran is offline  
Old 19 August 2005, 04:31   #15
Galaxy
Registered User
 
Galaxy's Avatar
 
Join Date: May 2004
Location: Canberra, Australia
Age: 46
Posts: 1,417
I usually use 300dpi/black and white for this sort of scanning.

In this case I used 200dpi greyscale.
Galaxy is offline  
Old 19 August 2005, 16:48   #16
girv
Mostly Harmless
 
girv's Avatar
 
Join Date: Aug 2004
Location: Northern Ireland
Posts: 1,109
Thanks for the scan

Its a sound enough article on basic stream mode encryption. To his credit the author does advise that the algorithms are easily cracked and not to be used for anything you actually want to remain secret

Theres one common mistake though: XOR encrypting data more than once with different keys is no more secure than encrypting it once, as the XORs effectively combine all the keys into one.
girv is offline  
Old 20 August 2005, 08:05   #17
redblade
Zone Friend
 
redblade's Avatar
 
Join Date: Mar 2004
Location: Middle Earth
Age: 40
Posts: 2,127
girv: do you use Amitcp:libs/usergroup.library/crypt() ???

I seem to have problem with that function.

I dissassembled bin/login, and copied the salt(setting).

so when I coded my own routine and tried comparing my crypt() result with the one from bin/login I got a different pw .
redblade is offline  
Old 21 August 2005, 04:29   #18
girv
Mostly Harmless
 
girv's Avatar
 
Join Date: Aug 2004
Location: Northern Ireland
Posts: 1,109
I've never used that function, sorry.

Are you sure youre using the exact same algorithm in your own code as the library does?
girv is offline  
Old 22 August 2005, 04:18   #19
redblade
Zone Friend
 
redblade's Avatar
 
Join Date: Mar 2004
Location: Middle Earth
Age: 40
Posts: 2,127
I'm actually calling the libraries crypt() function.

but it's interesting because it says in the docs that the salt begins with a underscore '_' let the salt that I get from my code is the first 9 letters of the encrypted password :/
redblade is offline  
Old 22 August 2005, 14:08   #20
girv
Mostly Harmless
 
girv's Avatar
 
Join Date: Aug 2004
Location: Northern Ireland
Posts: 1,109
Can you post the code you're using? Also where did you get the library and its autodocs?
girv is offline  
 


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools

Similar Threads
Thread Thread Starter Forum Replies Last Post
Total Amiga Assembler - Paul Overaa Anding Coders. General 17 06 November 2015 14:53
Amiga Format issue 13 request Rob 1 Nostalgia & memories 35 08 April 2014 03:01
Total Amiga Assembler, by Paul Overaa Dan Locke MarketPlace 2 15 February 2010 17:45
Amiga Format Issue Kyon request.Old Rare Games 16 25 December 2009 19:52
Amiga Format Issue 39 Anubis AMR data problems 8 26 March 2007 13:53

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +2. The time now is 19:30.

Top

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Page generated in 0.09659 seconds with 13 queries