Author Archives: James Johnson

About James Johnson

I am an amateur mathematician & political theorist who enjoys (occasionally cerebral) humor.

A rudimentary OpenDRM

We all know that Open Source was to free ideas from incarceration, not deprive programmers of income. Here is a rudimentary “OpenDRM” scheme. Step 1 (Python script) Comments Updated Apr 22 Step 2 (Python script) – One possible “salt3” might … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

A work protocol for digital work product contract

Digital work product can be intercepted online, and distributed without the permission of either an employer or employee. To limit problems due to intercepted work product, here is an experimental protocol. Prepare an anonymous email account to receive the work. … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

A Residential Gateway implementation

Most DSL or Cable modem solutions employ a device called a “Residential Gateway,” that converts a transmission signal to a Local Area Network signal. Since most routers can clone the MAC address of a Network Interface Controller, it might be … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Another Vigenere fact: It can generate a “hash”

Vigenere only works if you implement the plaintext/password in a row/column order. If you reverse it, so you look up the password vertically (using it to choose the row,) and the plaintext horizontally (using it to choose the column) then … Continue reading

Posted in Uncategorized | Leave a comment

Illustration of Watermarking (Lossy Vigenere)

Simon Singh demonstrated a lossless Vigenere in his book, “The Code Book.” I learned it differently in my youth, under the moniker “Rogue’s Gallery.” This (symmetric) Vigenere is “lossy,” and replaces lost information with the character “z.” The placement of … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Theoretical Corporate ID card scheme

Holograms are famously hard to duplicate. Here is a scheme to use a hologram in an ID card. Using film, make a hologram of the employee’s bust, with company logo in the shot. Make an ordinary color photo as well. … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

International Digital Encryption Algorithm implementation.

The IDEA cipher was subject to an attack more efficient than brute force, in 2012. Despite this, competent researchers still agree that the attack is not yet computationally feasible. If you’re a little nervous, here’s a way to harden your … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment