Monthly Archives: November 2013

Reversibly convert a numeric to an alpha sequence.

Sometimes, one may choose to convert a numeric value to an alpha-numeric sequence. One way to do this is as follows: Compile a list of characters to select from, into an alphabet array ([1-9, A-z, a-z] is one suggestion, but … Continue reading

Posted in Uncategorized | Leave a comment

What is “key windup?”

When writing encryption, it is best practice to hash the password, such that the password cannot be recovered from the data, even if the ciphertext is deciphered by (usually statistical) analysis. A modification, is to hash the password several thousand … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Anonymous referrers can help fight DOS attacks for individuals

TOR networks are sometimes unpopular with security agencies, especially in foreign countries, however their¬†usefulness is not limited to skulduggery. If you need to read news articles as part of your professional life, or if you are obligated to read whitepapers … Continue reading

Posted in Uncategorized | Leave a comment

Chalk one up to Academia

I was wrong. I depended too much on inference. Wikipedia is incorrect. Fibonacci Coding does not compress information. I should have done the empirical testing BEFORE I broadcast, but I did not. Now a sadder but wiser blogger, I will … Continue reading

Posted in Uncategorized | Leave a comment

Correction: Fibonacci Coding can (NOT!) maximize compression

Jpeg’s, MP3’s and digital video, together with encrypted data, all create data dense encoding. As a result they are hard to compress further. In encryption, this hurdle is overcome by compressing first, before we encrypt, enhancing the effect of encryption … Continue reading

Posted in Uncategorized | Leave a comment

Abstract Digital Bill of Sale

The concept of duplicating a bill of sale does not usually¬†make us lose confidence in it. However, digitally, a duplicated bill of sale might be presented as a new and separate purchase, perhaps after minor modification. This theory attempts to … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment