Omnimaga
Calculator Community => TI Calculators => TI-BASIC => Topic started by: JustCause on December 01, 2010, 06:41:50 pm
-
A simple example program that converts text to ciphertext and back again. Because it uses the rand seed, it's super-secure: unless someone knows it was coded on a calc, they're not getting it decoded.
Supports A-Z and spaces. Key can be any number.
Optimizations welcome.
-
Removed voluntarily by author.
-
A simple example program that converts text to ciphertext and back again. Because it uses the rand seed, it's super-secure: unless someone knows it was coded on a calc, they're not getting it decoded.
Supports A-Z and spaces. Key can be any number.
Optimizations welcome.
The calc uses L'Ecuyer's algorithm. It's not a very secure pseudo random generator.
-
I do not know about encryption, but could you show examples of what would a certain word show up as when encrypted?
That said, although I think SirCmpwn's comment was uncalled for, it is pretty hard to have a secure encryption on a calc, even in BASIC. In my RPG The Reign of Legends 3, save files are compressed and encrypted using my own compression methods, but anyone who look at the code and understands BASIC could easily figure it out.
-
Looking at the code, that's actually a pretty good algorithm. What I would recommend is that you manipulate the strings during computation to take advantage of the avalanche effect in another way. It would also make it a lot more difficult to understand how the algorithm works. I have some example code I can post if you'd like.
-
That would be cool :D
-
Now where did Battlefield go...
Ah, here it is:
:" →Str2
:" →Str1
:Repeat length(Str2)=7
:Repeat Ans>40 and Ans<94 or Ans=102
:getKey→K
:End
:If Ans≠44 and Ans≠45 and Ans<94:Then
:Ans-20-5int(.1Ans
:Str2+sub("ABC DEFGHIJKLMNOPQRSTUVWXYZ",Ans,1→Str2
:Text(26,2,sub(Str2,2,length(Str2)-1
:End
:If K=45 and length(Str2)>1:Then
:sub(Str2,1,length(Str2)-1→Str2
:Text(26,1," "
:Text(26,1,Str2
:End
:If K=102:Then
:Str2+" →Str2
:Text(26,1,Str2
:End
:End
:sub(Str2,2,length(Str2)-1→Str2
:Text(26,2,Str2
:"TEYGJKMNOQRAUBCIVWDLEFHSZ "→Str3
:For(A,1,6
:Str1+sub(Str2,7-A,1)→Str1
:End
:sub(Str1,2,6→Str2
:For(A,1,6
:inString(Str3,sub(Str2,A,1→B
:length(Str3)→D
:(C-B)/(B+C)+B*C→C
:End
This is the reasonably fast algorithm I used in Battlefield. It's not the best one I had, but it's good enough. See if you can understand how it works.
Also, if following the program flow gives you a headache, you should have seen the previous version :devil:
On a side note, this is about as close to SMC as you can get in BASIC without a ton of Goto statements.
-
I'll probably have to concentrate a bit to understand. I have troubles reading other people code. ;D
-
Following the String manipulation is the difficult part. Try to concentrate on the second part (after
":sub(Str2,2,length(Str2)-1→Str2")
-
I'll probably also have to run parts of the program a few times to analyze it, since I'm more visual. :P
-
Here's the routine in a BASIC program
-
Oh thanks that might save me some time lol, although since your code was in SourceCoder format (noticing the STO symbol used) I could have copied it on my calc. :D
Being visual is most likely what hindered me when I tried to learn ASM from ASM in 28 days D:
-
I already had the routine open in sourcecoder and that way everyone can try the code for themselves, rather than having to copy it into their calc.
-
Topic title changed. To be fair, when I said "secure" I meant "your crypto nerd friends will go at it for about a week," rather than "1024-bit RSA suitable for issues of national security."
Though I did make 16-bit RSA once. :)
-
How long does a 16 bit key takes to get factored on-calc? What about a recent computer?
-
It takes forever to pick the key to begin with.
-
How long does a 16 bit key takes to get factored on-calc? What about a recent computer?
16 bits means 2^16 possibilities or 65,536 different options. So about a millisecond either way. (Depending on the algorithm. Counting 1-256 would be faster, and that's all you need to count to find factors)
Also, sadly, I just became un-evil'ed.
-
I see, pretty fast then, lol. :P
-
How long does a 16 bit key takes to get factored on-calc? What about a recent computer?
...okay, so it can be human-factored in under 5 minutes. It was a proof of concept XD
-
To discourage people from cheating in BASIC games by modifying save data, if you can't use a complex encryption method and the save files can be decrypted pretty fast, I just make the save file be deleted completely upon game loading if the game detects it was modified and has invalid values. In Mana Force 2, when you tried to load a save file where you're Level 120 for example, it started a new game instead.