Re: ANN: obfuscate 0.2.2

2017-11-13 Thread Rick Johnson
On Monday, November 13, 2017 at 6:03:23 PM UTC-6, joshj...@gmail.com wrote:
> for importing obfuscate do we just type in import obfuscate
> or import obfuscate 0.2.2

Oh boy. I had forgotten about this little community "gem"
dating back to 2010. And unfortunately for comrade Steven,
there is no way to obfuscate this thread! Not even double
rot13 will help! :-))
-- 
https://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2017-11-13 Thread joshjon2017
for importing obfuscate do we just type in import obfuscate or import obfuscate 
0.2.2
-- 
https://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2010-04-10 Thread Paul Rubin
Steven D'Aprano st...@remove-this-cybersource.com.au writes:
 DISCLAIMER: obfuscate is not cryptographically strong, and should not be
 used where high security is required.

Certainly no one should never use obfuscate's rot13 function for high
security.  Use at least double-rot13 instead, or maybe even quadruple
rot13 ;-).
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2010-04-10 Thread Steven D'Aprano
On Sat, 10 Apr 2010 13:34:17 -0700, Paul Rubin wrote:

 Steven D'Aprano st...@remove-this-cybersource.com.au writes:
 DISCLAIMER: obfuscate is not cryptographically strong, and should not
 be used where high security is required.
 
 Certainly no one should never use obfuscate's rot13 function for high
 security.  Use at least double-rot13 instead, or maybe even quadruple
 rot13 ;-).

Ha ha, that's funny! I've never heard that one before! *wink*

I may add a quadruple-rot13 to the next release. Would you like credit?

obfuscate does include ciphers which, prior to the invention of the 
computer, were good enough for real world use. E.g. the Playfair cipher 
was still in use for field communications in World War 2, e.g:

http://practicalcryptography.com/ciphers/playfair-cipher/

and of course Vigenere is uncrackable if you provide it with a 
cryptographically random key as long as the message which you use only 
once. (In that case, it is a one-time-pad.)



-- 
Steven
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2010-04-10 Thread geremy condra
On Sun, Apr 11, 2010 at 1:17 AM, Steven D'Aprano
st...@remove-this-cybersource.com.au wrote:
 On Sat, 10 Apr 2010 13:34:17 -0700, Paul Rubin wrote:

 Steven D'Aprano st...@remove-this-cybersource.com.au writes:
 DISCLAIMER: obfuscate is not cryptographically strong, and should not
 be used where high security is required.

 Certainly no one should never use obfuscate's rot13 function for high
 security.  Use at least double-rot13 instead, or maybe even quadruple
 rot13 ;-).

 Ha ha, that's funny! I've never heard that one before! *wink*

I think I lost a sarcasm detector to this line- are you being serious?

Geremy Condra
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2010-04-10 Thread Steven D'Aprano
On Sun, 11 Apr 2010 03:00:50 +, geremy condra wrote:

 On Sun, Apr 11, 2010 at 1:17 AM, Steven D'Aprano
 st...@remove-this-cybersource.com.au wrote:
 On Sat, 10 Apr 2010 13:34:17 -0700, Paul Rubin wrote:

 Steven D'Aprano st...@remove-this-cybersource.com.au writes:
 DISCLAIMER: obfuscate is not cryptographically strong, and should not
 be used where high security is required.

 Certainly no one should never use obfuscate's rot13 function for high
 security.  Use at least double-rot13 instead, or maybe even quadruple
 rot13 ;-).

 Ha ha, that's funny! I've never heard that one before! *wink*
 
 I think I lost a sarcasm detector to this line- are you being serious?


Possibly I overloaded your sarcasm detector and broke it.

No, I'm not serious. If I had a dollar for every time somebody suggested 
using rot13 twice for extra security, I could buy out Microsoft.

Hell, if I had a dollar for every time *I* suggested using rot13 twice, I 
could buy out Google.




-- 
Steven
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2010-04-10 Thread Aahz
In article mailman.1734.1270954853.23598.python-l...@python.org,
geremy condra  debat...@gmail.com wrote:
On Sun, Apr 11, 2010 at 1:17 AM, Steven D'Aprano
st...@remove-this-cybersource.com.au wrote:
 On Sat, 10 Apr 2010 13:34:17 -0700, Paul Rubin wrote:
 Steven D'Aprano st...@remove-this-cybersource.com.au writes:

 DISCLAIMER: obfuscate is not cryptographically strong, and should not
 be used where high security is required.

 Certainly no one should never use obfuscate's rot13 function for high
 security. Use at least double-rot13 instead, or maybe even quadruple
 rot13 ;-).

 Ha ha, that's funny! I've never heard that one before! *wink*

I think I lost a sarcasm detector to this line- are you being serious?

There are people who have a .sig that says, This message protected by
double-rot13 for extra security.  It's an extremely common jape.
-- 
Aahz (a...@pythoncraft.com)   * http://www.pythoncraft.com/

It is easier to optimize correct code than to correct optimized code.
--Bill Harlan
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2010-04-10 Thread geremy condra
On Sun, Apr 11, 2010 at 3:44 AM, Steven D'Aprano
st...@remove-this-cybersource.com.au wrote:
 On Sun, 11 Apr 2010 03:00:50 +, geremy condra wrote:

 On Sun, Apr 11, 2010 at 1:17 AM, Steven D'Aprano
 st...@remove-this-cybersource.com.au wrote:
 On Sat, 10 Apr 2010 13:34:17 -0700, Paul Rubin wrote:

 Steven D'Aprano st...@remove-this-cybersource.com.au writes:
 DISCLAIMER: obfuscate is not cryptographically strong, and should not
 be used where high security is required.

 Certainly no one should never use obfuscate's rot13 function for high
 security.  Use at least double-rot13 instead, or maybe even quadruple
 rot13 ;-).

 Ha ha, that's funny! I've never heard that one before! *wink*

 I think I lost a sarcasm detector to this line- are you being serious?


 Possibly I overloaded your sarcasm detector and broke it.

I figured, but given how severely it broke I couldn't be sure.
I suppose the fact that you used exclamation points should
have tipped me off, though.

Geremy Condra
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate 0.2.2

2010-04-10 Thread geremy condra
On Sun, Apr 11, 2010 at 4:37 AM, Aahz a...@pythoncraft.com wrote:
 In article mailman.1734.1270954853.23598.python-l...@python.org,
 geremy condra  debat...@gmail.com wrote:
On Sun, Apr 11, 2010 at 1:17 AM, Steven D'Aprano
st...@remove-this-cybersource.com.au wrote:
 On Sat, 10 Apr 2010 13:34:17 -0700, Paul Rubin wrote:
 Steven D'Aprano st...@remove-this-cybersource.com.au writes:

 DISCLAIMER: obfuscate is not cryptographically strong, and should not
 be used where high security is required.

 Certainly no one should never use obfuscate's rot13 function for high
 security. Use at least double-rot13 instead, or maybe even quadruple
 rot13 ;-).

 Ha ha, that's funny! I've never heard that one before! *wink*

I think I lost a sarcasm detector to this line- are you being serious?

 There are people who have a .sig that says, This message protected by
 double-rot13 for extra security.  It's an extremely common jape.

I work in infosec. I've heard it ;)

Geremy Condra
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-12 Thread Tim Golden

On 11/02/2010 11:32, Paul Rubin wrote:

Gregory Ewinggreg.ew...@canterbury.ac.nz  writes:

Actually I gather it had a lot to do with the fact that the Germans
made some blunders in the way they used the Enigma that seriously
compromised its security. There was reportedly a branch of the German
forces that used their Enigmas differently, avoiding those mistakes,
and the British never managed to crack any of their messages.


I think you are thinking of the Kriegsmarine (naval) Enigma.  Yes they
were more careful with procedures, but the machine was also harder to
crack because it had four rotors instead of three.  IIRC, the Brits were
eventually (1942?) able to capture one by shooting up a German submarine
and boarding it to get the machine while the sub was sinking; a British
sailor wasn't able to get out in time and drowned during that operation.
Getting the rotor settings off the captured unit (they may have had to
do it more than once) was enough to get a foothold into the code.  My
memory is hazy on this by now so I may have some parts wrong, but David
Kahn's book Seizing the Enigma tells the story (I read it many years
ago).  A fictionalized version appears in Neil Stephenson's novel
Cryptonomicon.


And for those who haven't been to Bletchley Park [*] I recommend it.
Not only is it full of interesting stuff, but it has an engagingly
amateurish air about it which I personally prefer to the sleek-and-shiny
nature of many museum-y places today. When I was there last summer I
was disappointed to see that they'd closed the Pigeon Museum. But the
Model Railway club was still there (altho' we were too late in the day
to get in) and the new Computing Museum is full of delightful nostalgic
clutter being worked on by enthusiastic people. My kind of place..

TJG

[*] http://www.bletchleypark.org.uk/
--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-12 Thread Bob Martin
in 16 20100212 034121 Paul Rubin no.em...@nospam.invalid wrote:

See  http://en.wikipedia.org/wiki/Colossus_computer
That was almost at the end of the war though.

Colossus was working by the end of 1943 - the year that the Americans first 
dropped
bombs on Germany   ;-)
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-12 Thread Paul Rubin
Mark Lawrence breamore...@yahoo.co.uk writes:
 The predecessor of the Enigma was cracked by Polish scientists years
 before WW2 started
 I believe that all of Enigma was eventually cracked cos of two major
 flaws.

I think it never would have been cracked if it hadn't been cracked
(whether by the Brits or the Poles) before the war started, using
commercial versions of the Enigma that they had access to.  The military
Enigma and its operating methods got more sophisticated as the war went
on, and the cryptanalysts were able to keep up with it by incrementally
improving techniques that they were already using at scale.  If they
were suddenly confronted with the full-blown military system in the
middle of the war, it would have been a lot harder to do anything about
it.  At least, most of the Enigma-related books I've read give that
impression and even come out and say such things.

 Further, the far more powerful Geheimscreiber was also cracked at
 Bletchley by using Colossus.  Sorry some years since I read the book
 about this so can't remember the title or author.

See  http://en.wikipedia.org/wiki/Colossus_computer
That was almost at the end of the war though.  
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-12 Thread Jean-Michel Pichavant

Bob Martin wrote:

in 16 20100212 034121 Paul Rubin no.em...@nospam.invalid wrote:

  

See  http://en.wikipedia.org/wiki/Colossus_computer
That was almost at the end of the war though.



Colossus was working by the end of 1943 - the year that the Americans first 
dropped
bombs on Germany   ;-)
  

sept 1939 - sept 1945. It's nearer from the end, than from the begining.

JM
--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-12 Thread Bob Martin
in 144460 20100212 103319 Jean-Michel Pichavant jeanmic...@sequans.com wrote:
Bob Martin wrote:
 in 16 20100212 034121 Paul Rubin no.em...@nospam.invalid wrote:


 See  http://en.wikipedia.org/wiki/Colossus_computer
 That was almost at the end of the war though.


 Colossus was working by the end of 1943 - the year that the Americans first 
 dropped
 bombs on Germany   ;-)

sept 1939 - sept 1945. It's nearer from the end, than from the begining.

If I must spell it out  ;-)
Near the end for us Brits but the Americans were only just getting into the 
action
in Europe.
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-12 Thread Mark Lawrence

Paul Rubin wrote:

Mark Lawrence breamore...@yahoo.co.uk writes:

The predecessor of the Enigma was cracked by Polish scientists years
before WW2 started

I believe that all of Enigma was eventually cracked cos of two major
flaws.


I think it never would have been cracked if it hadn't been cracked
(whether by the Brits or the Poles) before the war started, using
commercial versions of the Enigma that they had access to.  The military
Enigma and its operating methods got more sophisticated as the war went
on, and the cryptanalysts were able to keep up with it by incrementally
improving techniques that they were already using at scale.  If they
were suddenly confronted with the full-blown military system in the
middle of the war, it would have been a lot harder to do anything about
it.  At least, most of the Enigma-related books I've read give that
impression and even come out and say such things.

I completely agree.



Further, the far more powerful Geheimscreiber was also cracked at
Bletchley by using Colossus.  Sorry some years since I read the book
about this so can't remember the title or author.


See  http://en.wikipedia.org/wiki/Colossus_computer
That was almost at the end of the war though.  


--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-11 Thread Christian Heimes
Gregory Ewing wrote:
 Actually I gather it had a lot to do with the fact that
 the Germans made some blunders in the way they used the
 Enigma that seriously compromised its security. There
 was reportedly a branch of the German forces that used
 their Enigmas differently, avoiding those mistakes, and
 the British never managed to crack any of their messages.

IIRC some versions of the Enigma weren't cracked because they used a
different setup and different daily keys.

The predecessor of the Enigma was cracked by Polish scientists years
before WW2 started. Some flaws in the instructions and a known plain
text attack made the crack of the Enigma practical. It took the British
scientists merely hours rather than days or weeks to decipher the daily
key with some smart tricks. For example they started fake attacks on
ships or cities just to have the names in some encrypted reports.
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-11 Thread Gregory Ewing

Daniel Fetchinson wrote:


It also turned out that everybody mostly writes his/her
own obfuscation routine.


Hey, it gives you the additional advantage of obfuscation
by obscurity!

--
Greg
--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-11 Thread Paul Rubin
Gregory Ewing greg.ew...@canterbury.ac.nz writes:
 Actually I gather it had a lot to do with the fact that the Germans
 made some blunders in the way they used the Enigma that seriously
 compromised its security. There was reportedly a branch of the German
 forces that used their Enigmas differently, avoiding those mistakes,
 and the British never managed to crack any of their messages.

I think you are thinking of the Kriegsmarine (naval) Enigma.  Yes they
were more careful with procedures, but the machine was also harder to
crack because it had four rotors instead of three.  IIRC, the Brits were
eventually (1942?) able to capture one by shooting up a German submarine
and boarding it to get the machine while the sub was sinking; a British
sailor wasn't able to get out in time and drowned during that operation.
Getting the rotor settings off the captured unit (they may have had to
do it more than once) was enough to get a foothold into the code.  My
memory is hazy on this by now so I may have some parts wrong, but David
Kahn's book Seizing the Enigma tells the story (I read it many years
ago).  A fictionalized version appears in Neil Stephenson's novel
Cryptonomicon.
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-11 Thread MRAB

Christian Heimes wrote:

Gregory Ewing wrote:

Actually I gather it had a lot to do with the fact that the Germans
made some blunders in the way they used the Enigma that seriously
compromised its security. There was reportedly a branch of the
German forces that used their Enigmas differently, avoiding those
mistakes, and the British never managed to crack any of their
messages.


IIRC some versions of the Enigma weren't cracked because they used a 
different setup and different daily keys.


The predecessor of the Enigma was cracked by Polish scientists years 
before WW2 started. Some flaws in the instructions and a known plain 
text attack made the crack of the Enigma practical. It took the

British scientists merely hours rather than days or weeks to decipher
the daily key with some smart tricks. For example they started fake
attacks on ships or cities just to have the names in some encrypted
reports.


In some cases the British had decoded the messages before the intended
recipient!

The Americans decoded Japanese messages about an planned attack on an
island, but didn't know which one because of the fake names, so they
instructed their bases to report certain problems in a way that the
Japanese could decode.

Midway reported a shortage of water, the Japanese decoded it and sent a
message about it, the Americans decoded their message and discovered
that island's fake name, and thus found out that Midway was the intended
target of the attack.

--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-11 Thread Matthew Barnett

Paul Rubin wrote:

Gregory Ewing greg.ew...@canterbury.ac.nz writes:

Actually I gather it had a lot to do with the fact that the Germans
made some blunders in the way they used the Enigma that seriously
compromised its security. There was reportedly a branch of the German
forces that used their Enigmas differently, avoiding those mistakes,
and the British never managed to crack any of their messages.


I think you are thinking of the Kriegsmarine (naval) Enigma.  Yes they
were more careful with procedures, but the machine was also harder to
crack because it had four rotors instead of three.  IIRC, the Brits were
eventually (1942?) able to capture one by shooting up a German submarine
and boarding it to get the machine while the sub was sinking; a British
sailor wasn't able to get out in time and drowned during that operation.
Getting the rotor settings off the captured unit (they may have had to
do it more than once) was enough to get a foothold into the code.  My
memory is hazy on this by now so I may have some parts wrong, but David
Kahn's book Seizing the Enigma tells the story (I read it many years
ago).  A fictionalized version appears in Neil Stephenson's novel
Cryptonomicon.


U-559? I think that's the one where Hollywood made a film about it, but
portraying it as a purely American action. That didn't go down too well
in the UK!
--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-11 Thread MRAB

Paul Rubin wrote:

Gregory Ewing greg.ew...@canterbury.ac.nz writes:

Actually I gather it had a lot to do with the fact that the Germans
made some blunders in the way they used the Enigma that seriously
compromised its security. There was reportedly a branch of the German
forces that used their Enigmas differently, avoiding those mistakes,
and the British never managed to crack any of their messages.


I think you are thinking of the Kriegsmarine (naval) Enigma.  Yes they
were more careful with procedures, but the machine was also harder to
crack because it had four rotors instead of three.  IIRC, the Brits were
eventually (1942?) able to capture one by shooting up a German submarine
and boarding it to get the machine while the sub was sinking; a British
sailor wasn't able to get out in time and drowned during that operation.
Getting the rotor settings off the captured unit (they may have had to
do it more than once) was enough to get a foothold into the code.  My
memory is hazy on this by now so I may have some parts wrong, but David
Kahn's book Seizing the Enigma tells the story (I read it many years
ago).  A fictionalized version appears in Neil Stephenson's novel
Cryptonomicon.


U-559? I think that's the one where Hollywood made a film about it, but
portraying it as a purely American action. That didn't go down too well
in the UK!

--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-11 Thread Mark Lawrence

Christian Heimes wrote:

Gregory Ewing wrote:

Actually I gather it had a lot to do with the fact that
the Germans made some blunders in the way they used the
Enigma that seriously compromised its security. There
was reportedly a branch of the German forces that used
their Enigmas differently, avoiding those mistakes, and
the British never managed to crack any of their messages.


IIRC some versions of the Enigma weren't cracked because they used a
different setup and different daily keys.

The predecessor of the Enigma was cracked by Polish scientists years
before WW2 started. Some flaws in the instructions and a known plain
text attack made the crack of the Enigma practical. It took the British
scientists merely hours rather than days or weeks to decipher the daily
key with some smart tricks. For example they started fake attacks on
ships or cities just to have the names in some encrypted reports.


I believe that all of Enigma was eventually cracked cos of two major flaws.
1) A letter could never be sent as itself.
2) The Luftwaffe were very poor when compared to the Wehrmacht or 
Kriegsmarine about security so they were a major leak of data regarding 
the other organisations.
3) The users instead of using random three letter combinations kept 
using the same ones.  HIT LER and BER LIN were popular, but the most 
famous one at Bletchley Park was the name of the guy's girlfriend.


Further, the far more powerful Geheimscreiber was also cracked at 
Bletchley by using Colossus.  Sorry some years since I read the book 
about this so can't remember the title or author.


Regards.

Mark Lawrence.

--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-10 Thread Daniel Fetchinson
 All algorithms in obfuscate are obsolete, insecure and only
 interesting for people *that* want to get well educated in the history
 of encryption.

 Not true. Another use case is suggested by the chosen name for the
 library: to obfuscate text against casual human reading, while not
 making it at all difficult to decrypt by people who are motivated to do
 so.

 The classic example is rot-13 encryption of text in internet messages;
 it would be a failure of imagination to suggest there are not other,
 similar use cases.

I fully agree. Judging by the posts on c.l.p the need for simple
obfuscation regularly comes up. I also posted something not so long
ago and got all sorts of useful advice, a package here, a module
there, etc. It also turned out that everybody mostly writes his/her
own obfuscation routine. That is why I suggested that perhaps if the
code base stabilizes an inclusion into the stdlib could be discussed.
I'm not sure it really needs to go there but if it turns out that as
many people need this kind of stuff as I imagine it, well, then we
have enough use cases for sure.

 Grab pycrypto, m2crypto or one of the other packages if you need a
 minimum amount of security.

 Agreed. However, for cases that *don't* need security from determined
 attackers, I don't think those obviate the usefulness of this library.

Exactly.

Cheers,
Daniel




-- 
Psss, psss, put it down! - http://www.cafepress.com/putitdown
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-10 Thread Simon Brunning
On 10 February 2010 01:24, Ben Finney ben+pyt...@benfinney.id.au wrote:
 The classic example is rot-13 encryption of text in internet messages;
 it would be a failure of imagination to suggest there are not other,
 similar use cases.

That's built-in:

 Hello World!.encode('rot-13')
'Uryyb Jbeyq!'

-- 
Cheers,
Simon B.
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-10 Thread Tim Golden

On 10/02/2010 11:23, Simon Brunning wrote:

Hello World!.encode('rot-13')


Not any more!

dump
Python 3.1.1 (r311:74483, Aug 17 2009,
win32
Type help, copyright, credits or

Hello World!.encode('rot-13')

Traceback (most recent call last):
  File stdin, line 1, in module
LookupError: unknown encoding: rot-13





/dump

TJG
--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-10 Thread Gregory Ewing

Christian Heimes wrote:

A much, much stronger version of the
principles behind Vigenère was used in the German Enigma machine.
Because the algorithm was still not good enought some clever guy called
Turing and his team was able to crack the enigma.


Actually I gather it had a lot to do with the fact that
the Germans made some blunders in the way they used the
Enigma that seriously compromised its security. There
was reportedly a branch of the German forces that used
their Enigmas differently, avoiding those mistakes, and
the British never managed to crack any of their messages.

--
Greg
--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Roy Smith
In article 00fa27a3$0$15628$c3e8...@news.astraweb.com,
 Steven D'Aprano st...@remove-this-cybersource.com.au wrote:

 I am pleased to announce the first public release of obfuscate 0.2.2a.
 
 http://pypi.python.org/pypi/obfuscate/0.2.2a
 
 obfuscate is a pure-Python module providing classical encryption 
 algorithms suitable for obfuscating and unobfuscating text.
 
 obfuscate includes the following ciphers:
  - Caesar, rot13, rot5, rot18, rot47
  - atbash
  - Playfair, Playfair6 and Playfair16
  - Railfence (encryption only)
  - Keyword
  - Affine
  - Vigenere
  - frob (xor)

No pig latin?
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Daniel Fetchinson
 I am pleased to announce the first public release of obfuscate 0.2.2a.

 http://pypi.python.org/pypi/obfuscate/0.2.2a

 obfuscate is a pure-Python module providing classical encryption
 algorithms suitable for obfuscating and unobfuscating text.

 obfuscate includes the following ciphers:
  - Caesar, rot13, rot5, rot18, rot47
  - atbash
  - Playfair, Playfair6 and Playfair16
  - Railfence (encryption only)
  - Keyword
  - Affine
  - Vigenere
  - frob (xor)

 and others.

 DISCLAIMER: obfuscate is not cryptographically strong, and should not be
 used where high security is required. (The ciphers provided in obfuscate
 may have been state of the art centuries ago, but should not be used
 where strong encryption is required.

 obfuscate is released under the MIT licence.

 Requires Python 2.5 or 2.6.

Great, these packages are badly needed!

If the code base stabilizes in a production version after losing the
alphas and betas they would be a great addition to the stdlib, I
think.

Cheers,
Daniel


-- 
Psss, psss, put it down! - http://www.cafepress.com/putitdown
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Robert Kern

On 2010-02-09 09:37 AM, Daniel Fetchinson wrote:

I am pleased to announce the first public release of obfuscate 0.2.2a.

http://pypi.python.org/pypi/obfuscate/0.2.2a

obfuscate is a pure-Python module providing classical encryption
algorithms suitable for obfuscating and unobfuscating text.

obfuscate includes the following ciphers:
  - Caesar, rot13, rot5, rot18, rot47
  - atbash
  - Playfair, Playfair6 and Playfair16
  - Railfence (encryption only)
  - Keyword
  - Affine
  - Vigenere
  - frob (xor)

and others.

DISCLAIMER: obfuscate is not cryptographically strong, and should not be
used where high security is required. (The ciphers provided in obfuscate
may have been state of the art centuries ago, but should not be used
where strong encryption is required.

obfuscate is released under the MIT licence.

Requires Python 2.5 or 2.6.


Great, these packages are badly needed!

If the code base stabilizes in a production version after losing the
alphas and betas they would be a great addition to the stdlib, I
think.


Why?

--
Robert Kern

I have come to believe that the whole world is an enigma, a harmless enigma
 that is made terrible by our own mad attempt to interpret it as though it had
 an underlying truth.
  -- Umberto Eco

--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Aahz
In article mailman.2238.1265733013.28905.python-l...@python.org,
Robert Kern  robert.k...@gmail.com wrote:
On 2010-02-09 09:37 AM, Daniel Fetchinson wrote:

 obfuscate is a pure-Python module providing classical encryption
 algorithms suitable for obfuscating and unobfuscating text.

 DISCLAIMER: obfuscate is not cryptographically strong, and should not be
 used where high security is required. (The ciphers provided in obfuscate
 may have been state of the art centuries ago, but should not be used
 where strong encryption is required.

 Great, these packages are badly needed!

 If the code base stabilizes in a production version after losing the
 alphas and betas they would be a great addition to the stdlib, I
 think.

Why?

You missed the white-on-white smiley, I think.
-- 
Aahz (a...@pythoncraft.com)   * http://www.pythoncraft.com/

import antigravity
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Simon Brunning
On 9 February 2010 16:29, Robert Kern robert.k...@gmail.com wrote:
 On 2010-02-09 09:37 AM, Daniel Fetchinson wrote:
 If the code base stabilizes in a production version after losing the
 alphas and betas they would be a great addition to the stdlib, I
 think.

 Why?

I agree. Why wait? Put them in the stdlib now!

-- 
Cheers,
Simon B.
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread David Robinow
On Tue, Feb 9, 2010 at 5:10 PM, Simon Brunning si...@brunningonline.net wrote:
 On 9 February 2010 16:29, Robert Kern robert.k...@gmail.com wrote:
 On 2010-02-09 09:37 AM, Daniel Fetchinson wrote:
 If the code base stabilizes in a production version after losing the
 alphas and betas they would be a great addition to the stdlib, I
 think.

 Why?

 I agree. Why wait? Put them in the stdlib now!

 --
 Cheers,
 Simon B.
Can we please stop this?
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Alf P. Steinbach

* David Robinow:

On Tue, Feb 9, 2010 at 5:10 PM, Simon Brunning si...@brunningonline.net wrote:

On 9 February 2010 16:29, Robert Kern robert.k...@gmail.com wrote:

On 2010-02-09 09:37 AM, Daniel Fetchinson wrote:

If the code base stabilizes in a production version after losing the
alphas and betas they would be a great addition to the stdlib, I
think.

Why?

I agree. Why wait? Put them in the stdlib now!


Can we please stop this?


I agree.

I haven't looked at the code but the functionality that's listed is useful, e.g. 
in a Usenet client, and it's fun to play around with for a beginner.


Also, for example, Christian Heimes wrote else-thread: «Your work should be 
interesting for everybody who has read Simon Sing's The Code Book: The Science 
of Secrecy from Ancient Egypt to Quantum» (and I for one have that book).



Cheers,

- Alf
--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Stef Mientki

On 10-02-2010 00:09, Alf P. Steinbach wrote:

* David Robinow:
On Tue, Feb 9, 2010 at 5:10 PM, Simon Brunning 
si...@brunningonline.net wrote:

On 9 February 2010 16:29, Robert Kern robert.k...@gmail.com wrote:

On 2010-02-09 09:37 AM, Daniel Fetchinson wrote:

If the code base stabilizes in a production version after losing the
alphas and betas they would be a great addition to the stdlib, I
think.

Why?

I agree. Why wait? Put them in the stdlib now!


Can we please stop this?


I agree.


sorry I don't,
unless Python is only meant for the very well educated people in encryption.

I haven't looked at the code but the functionality that's listed is 
useful, e.g. in a Usenet client, and it's fun to play around with for 
a beginner.

I neither did look at the code,
but as a beginner with just 3 years of experience in Python,
I've tried several scrambling libs, for a quick and dirty use.
All were much too difficult, so I made my own xor-something.
Coming from Delphi, a scrambling lib is working is less than 10 minutes, 
without the need of any knowledge of encryption.
I prefer Python over Delphi, but some things are made very complex in 
Python.


cheers,
Stef


Also, for example, Christian Heimes wrote else-thread: «Your work 
should be interesting for everybody who has read Simon Sing's The 
Code Book: The Science of Secrecy from Ancient Egypt to Quantum» (and 
I for one have that book).



Cheers,

- Alf


--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread rantingrick
On Feb 9, 7:21 am, Roy Smith r...@panix.com wrote:
 In article 00fa27a3$0$15628$c3e8...@news.astraweb.com,
  Steven D'Aprano st...@remove-this-cybersource.com.au wrote:

[..]

 No pig latin?

Wait a minute guys, Stevens a well known prankster and comic relief
clown around here, I think he's just shining us all on! ;o)
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Gabriel Genellina
En Tue, 09 Feb 2010 20:27:13 -0300, Stef Mientki stef.mien...@gmail.com  
escribió:

On 10-02-2010 00:09, Alf P. Steinbach wrote:

* David Robinow:
On Tue, Feb 9, 2010 at 5:10 PM, Simon Brunning  
si...@brunningonline.net wrote:

On 9 February 2010 16:29, Robert Kern robert.k...@gmail.com wrote:

On 2010-02-09 09:37 AM, Daniel Fetchinson wrote:

If the code base stabilizes in a production version after losing the
alphas and betas they would be a great addition to the stdlib, I
think.

Why?

I agree. Why wait? Put them in the stdlib now!

Can we please stop this?

I agree.


sorry I don't,
unless Python is only meant for the very well educated people in  
encryption.


I haven't looked at the code but the functionality that's listed is  
useful, e.g. in a Usenet client, and it's fun to play around with for a  
beginner.

I neither did look at the code,
but as a beginner with just 3 years of experience in Python,
I've tried several scrambling libs, for a quick and dirty use.
All were much too difficult, so I made my own xor-something.
Coming from Delphi, a scrambling lib is working is less than 10 minutes,  
without the need of any knowledge of encryption.
I prefer Python over Delphi, but some things are made very complex in  
Python.


Are you sure?


def xor(s, key):

...   return ''.join(chr(ord(c)^key) for c in s)
...

txt = Hello world!
xor(txt, 123)

'3\x1e\x17\x17\x14[\x0c\x14\t\x17\x1fZ'

xor(_, 123)

'Hello world!'

The Delphi code would be certainly longer than that, some variation of:

function encrypt_xor(const s: string; key: integer);
var
  i: integer;
begin
  SetLength(Result, length(s));
  for i:=1 to length(s) do
  begin
Result[i] := chr(ord(s[i]) xor key);
  end;
end;

(untested)

--
Gabriel Genellina

--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Christian Heimes
Stef Mientki wrote:
 sorry I don't,
 unless Python is only meant for the very well educated people in encryption.

All algorithms in obfuscate are obsolete, insecure and only interesting
for people *that* want to get well educated in the history of encryption.

 I neither did look at the code,
 but as a beginner with just 3 years of experience in Python,
 I've tried several scrambling libs, for a quick and dirty use.
 All were much too difficult, so I made my own xor-something.
 Coming from Delphi, a scrambling lib is working is less than 10 minutes, 
 without the need of any knowledge of encryption.
 I prefer Python over Delphi, but some things are made very complex in 
 Python.

It's tricky to implement modern cryptographic algorithms with Python.
Most example codes are written in C and the implementations are using
overflow (e.g. 255 + 1 == 0) a lot. It took me twice as long to get the
TEA family (TEA, XTEA, XXTEA) crypt functions right in Python than I
required to wrap existing code in an handwritten C interface.

One of the strongest encryption algorithm in the list -- Vigenère -- was
crack over 150 years (!) ago. A much, much stronger version of the
principles behind Vigenère was used in the German Enigma machine.
Because the algorithm was still not good enought some clever guy called
Turing and his team was able to crack the enigma. It's one of the main
reasons the Germans were defeated and the world doesn't look like in
Robert Harris Fatherland today. Oh, and we go computers, too. ;)

Grab pycrypto, m2crypto or one of the other packages if you need a
minimum amount of security.

Christian
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Ben Finney
Christian Heimes li...@cheimes.de writes:

 All algorithms in obfuscate are obsolete, insecure and only
 interesting for people *that* want to get well educated in the history
 of encryption.

Not true. Another use case is suggested by the chosen name for the
library: to obfuscate text against casual human reading, while not
making it at all difficult to decrypt by people who are motivated to do
so.

The classic example is rot-13 encryption of text in internet messages;
it would be a failure of imagination to suggest there are not other,
similar use cases.

 Grab pycrypto, m2crypto or one of the other packages if you need a
 minimum amount of security.

Agreed. However, for cases that *don't* need security from determined
attackers, I don't think those obviate the usefulness of this library.

-- 
 \ “Reality must take precedence over public relations, for nature |
  `\cannot be fooled.” —Richard P. Feynman |
_o__)  |
Ben Finney
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-09 Thread Steven D'Aprano
On Wed, 10 Feb 2010 02:03:47 +0100, Christian Heimes wrote:

 Stef Mientki wrote:
 sorry I don't,
 unless Python is only meant for the very well educated people in
 encryption.
 
 All algorithms in obfuscate are obsolete, insecure and only interesting
 for people *that* want to get well educated in the history of
 encryption.
[...]
 Grab pycrypto, m2crypto or one of the other packages if you need a
 minimum amount of security.

As the author of obfuscate, I would like to second Christian's statement. 
obfuscate is NOT meant for serious security, as I state in both the 
source code and the documentation to the module.

That's not to say that it can't be useful for some people -- I wouldn't 
have spent the time writing it if I didn't think it was useful. But it is 
useful for obfuscation, education and puzzles, not for secure encryption.

I'm not sure how serious the calls for this to be added to the standard 
library are. If they're serious, I'm grateful for the votes of confidence 
from people, but I can't imagine Guido saying yes. In any case, it's 
premature to talk about adding it to the std library while it is still in 
alpha.

Thank you for all the comments, even the tongue-in-cheek ones. This has 
exceeded my wildest expectations! I'm always interested in feedback, good 
and bad, either publicly or privately.



-- 
Steven
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-08 Thread Christian Heimes
Steven D'Aprano schrieb:
 I am pleased to announce the first public release of obfuscate 0.2.2a.
 
 http://pypi.python.org/pypi/obfuscate/0.2.2a
 
 obfuscate is a pure-Python module providing classical encryption 
 algorithms suitable for obfuscating and unobfuscating text.
 
 obfuscate includes the following ciphers:
  - Caesar, rot13, rot5, rot18, rot47
  - atbash
  - Playfair, Playfair6 and Playfair16
  - Railfence (encryption only)
  - Keyword
  - Affine
  - Vigenere
  - frob (xor)

Nice work!

Your work should be interesting for everybody who has read Simon Sing's
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum.

Christian
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-08 Thread geremy condra
On Mon, Feb 8, 2010 at 6:46 PM, Steven D'Aprano
st...@remove-this-cybersource.com.au wrote:
 I am pleased to announce the first public release of obfuscate 0.2.2a.

 http://pypi.python.org/pypi/obfuscate/0.2.2a

 obfuscate is a pure-Python module providing classical encryption
 algorithms suitable for obfuscating and unobfuscating text.

 obfuscate includes the following ciphers:
  - Caesar, rot13, rot5, rot18, rot47
  - atbash
  - Playfair, Playfair6 and Playfair16
  - Railfence (encryption only)
  - Keyword
  - Affine
  - Vigenere
  - frob (xor)

 and others.

 DISCLAIMER: obfuscate is not cryptographically strong, and should not be
 used where high security is required. (The ciphers provided in obfuscate
 may have been state of the art centuries ago, but should not be used
 where strong encryption is required.

 obfuscate is released under the MIT licence.

 Requires Python 2.5 or 2.6.


 --
 Steven D'Aprano
 --
 http://mail.python.org/mailman/listinfo/python-list


Nice! Maybe someday you can extend it with a pen-and-paper
signature scheme ;)

Geremy Condra
-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-08 Thread Tim Chase

Steven D'Aprano wrote:
obfuscate is a pure-Python module providing classical encryption 
algorithms suitable for obfuscating and unobfuscating text.


obfuscate includes the following ciphers:
 - Caesar, rot13, rot5, rot18, rot47
 - atbash
 - Playfair, Playfair6 and Playfair16
 - Railfence (encryption only)
 - Keyword
 - Affine
 - Vigenere
 - frob (xor)


I prefer the strength of Triple ROT-13 for my obfuscation needs, 
but I don't see it listed here.  I guess I'll have to roll my own 
despite the dire warnings against amateur cryptographers 
authoring their own unvetted implementations.  ;-)


-tkc



--
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-08 Thread Chris Colbert
I always though a double rot13 followed by a rot26 was the best?

On Mon, Feb 8, 2010 at 9:19 PM, Tim Chase python.l...@tim.thechases.comwrote:

 Steven D'Aprano wrote:

 obfuscate is a pure-Python module providing classical encryption
 algorithms suitable for obfuscating and unobfuscating text.

 obfuscate includes the following ciphers:
  - Caesar, rot13, rot5, rot18, rot47
  - atbash
  - Playfair, Playfair6 and Playfair16
  - Railfence (encryption only)
  - Keyword
  - Affine
  - Vigenere
  - frob (xor)


 I prefer the strength of Triple ROT-13 for my obfuscation needs, but I
 don't see it listed here.  I guess I'll have to roll my own despite the dire
 warnings against amateur cryptographers authoring their own unvetted
 implementations.  ;-)

 -tkc




 --
 http://mail.python.org/mailman/listinfo/python-list

-- 
http://mail.python.org/mailman/listinfo/python-list


Re: ANN: obfuscate

2010-02-08 Thread Gregory Ewing

Tim Chase wrote:

I prefer the strength of Triple ROT-13 for my obfuscation needs, but I 
don't see it listed here.


That's old hat -- with the advent of 3GHz cpus and GPGPU, all the
experts are recommending quadruple ROT-128 nowadays.

--
Greg
--
http://mail.python.org/mailman/listinfo/python-list