Re: A new, fast and "unbreakable" encryption algorithm

2015-12-04 Thread Ismail Kizir
still is. And it has not any "red" cyphertext :) http://ismail-kizir.blogspot.com.tr/2015/11/visual-proofs-of-hohha-dynamic-xor.html On Fri, Dec 4, 2015 at 9:34 AM, Clemens Ladisch wrote: > Ismail Kizir wrote: >> What means "did not look random"? > > A plaint

Re: A new, fast and "unbreakable" encryption algorithm

2015-12-04 Thread Ismail Kizir
still is. And it has not any "red" cyphertext :) http://ismail-kizir.blogspot.com.tr/2015/11/visual-proofs-of-hohha-dynamic-xor.html On Fri, Dec 4, 2015 at 9:34 AM, Clemens Ladisch <clem...@ladisch.de> wrote: > Ismail Kizir wrote: >> What means "did not look random&qu

Re: A new, fast and "unbreakable" encryption algorithm

2015-12-03 Thread Ismail Kizir
Pavel, What means "did not look random"?? On the pictures, there is also an example of "full 0"(it appears red, but it is full 0 bmp) example. And it "looks" perfectly random. What are trying to do with your baseless allegations? Ismail On Fri, Dec 4, 2015 at 12:35 AM, Pavel Machek wrote: >

Re: A new, fast and "unbreakable" encryption algorithm

2015-12-03 Thread Ismail Kizir
Pavel, What means "did not look random"?? On the pictures, there is also an example of "full 0"(it appears red, but it is full 0 bmp) example. And it "looks" perfectly random. What are trying to do with your baseless allegations? Ismail On Fri, Dec 4, 2015 at 12:35 AM, Pavel Machek

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-20 Thread Ismail Kizir
Hello Clemens, Check this out please; just visual proofs: Better than thousands of lines: http://ismail-kizir.blogspot.com.tr/2015/11/visual-proofs-of-hohha-dynamic-xor.html Regards Ismail Kizir On Thu, Nov 19, 2015 at 11:05 AM, Clemens Ladisch wrote: > Ismail Kizir wrote: >> The

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-20 Thread Ismail Kizir
Hello Clemens, Check this out please; just visual proofs: Better than thousands of lines: http://ismail-kizir.blogspot.com.tr/2015/11/visual-proofs-of-hohha-dynamic-xor.html Regards Ismail Kizir On Thu, Nov 19, 2015 at 11:05 AM, Clemens Ladisch <clem...@ladisch.de> wrote: > Ismail Ki

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-19 Thread Ismail Kizir
not disturb kernel group anymore. Thank you very much in advance On Thu, Nov 19, 2015 at 2:31 PM, Ismail Kizir wrote: > Francly Lucasz, > > I am not an expert and never claimed it. > And I accept it's vulnerable to side channel attacks like the one you > mentioned. > With thi

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-19 Thread Ismail Kizir
ting the code on http://ismail-kizir.blogspot.com.tr/2015/11/hohha-dynamic-xor-algorithm-source-code.html Ismail Kizir CTO, Hohha Internet Services Ltd. On Thu, Nov 19, 2015 at 2:12 PM, Łukasz Stelmach wrote: > It was <2015-11-18 śro 06:25>, when Ismail Kizir wrote: >> Hello, >>

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-19 Thread Ismail Kizir
ting the code on http://ismail-kizir.blogspot.com.tr/2015/11/hohha-dynamic-xor-algorithm-source-code.html Ismail Kizir CTO, Hohha Internet Services Ltd. On Thu, Nov 19, 2015 at 2:12 PM, Łukasz Stelmach <l.stelm...@samsung.com> wrote: > It was <2015-11-18 śro 06:25>, when Ismail Kizi

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-19 Thread Ismail Kizir
not disturb kernel group anymore. Thank you very much in advance On Thu, Nov 19, 2015 at 2:31 PM, Ismail Kizir <iki...@gmail.com> wrote: > Francly Lucasz, > > I am not an expert and never claimed it. > And I accept it's vulnerable to side channel attacks like the on

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-18 Thread Ismail Kizir
l example: We do at least 2 jumps. So, we XOR the plaintext byte with at least 2 numbers. In this case, even if we have the plaintext and the cyphertext, we may just obtain the XOR result of 2 unknown values. Regards Ismail Kizir On Wed, Nov 18, 2015 at 6:33 PM, Harald Arnesen wrote: > Isma

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-18 Thread Ismail Kizir
on algorithm" to prevent States, besides inalphabet kids, from reading your files :) I believe this algorithm is the future of the encryption. Source code: http://ismail-kizir.blogspot.com/2015/11/hohha-dynamic-xor-algorithm-source-code.html Regards On Wed, Nov 18, 2015 at 6:33 PM, Harald Arnesen w

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-18 Thread Ismail Kizir
on algorithm" to prevent States, besides inalphabet kids, from reading your files :) I believe this algorithm is the future of the encryption. Source code: http://ismail-kizir.blogspot.com/2015/11/hohha-dynamic-xor-algorithm-source-code.html Regards On Wed, Nov 18, 2015 at 6:33 PM, Harald Arnesen &

Re: A new, fast and "unbreakable" encryption algorithm

2015-11-18 Thread Ismail Kizir
l example: We do at least 2 jumps. So, we XOR the plaintext byte with at least 2 numbers. In this case, even if we have the plaintext and the cyphertext, we may just obtain the XOR result of 2 unknown values. Regards Ismail Kizir On Wed, Nov 18, 2015 at 6:33 PM, Harald Arnesen <har...@skogtun.org

A new, fast and "unbreakable" encryption algorithm

2015-11-17 Thread Ismail Kizir
ude "Hohha Dynamic XOR Encryption Algorithm" on Linux Kernel. I will be glad to see my algorithm included in Linux distributions. Please feel free to ask if you have any questions. Regards Ismail Kizir -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in t

A new, fast and "unbreakable" encryption algorithm

2015-11-17 Thread Ismail Kizir
ude "Hohha Dynamic XOR Encryption Algorithm" on Linux Kernel. I will be glad to see my algorithm included in Linux distributions. Please feel free to ask if you have any questions. Regards Ismail Kizir -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in t