←  APIs and Utilities

ComputerCraft | Programmable Computers for Minecraft

»

RC4 Encryption API

theoriginalbit's Photo theoriginalbit 10 Aug 2013

 PixelToast, on 01 August 2013 - 02:13 PM, said:

i dont see a good way to generate large primes :/
KillaVanilla seemed to do it fine in his security protocol implementation...

 PixelToast, on 09 August 2013 - 05:35 PM, said:

o_O the topic was changed from RSA, derpy me
o.O It has always been RC4................
Quote

PixelToast's Photo PixelToast 10 Aug 2013

im pretty sure it was RSA before, idk
Quote

Elrond1369's Photo Elrond1369 14 Aug 2013

I doesn't seem to be working. It return question marks because it tries to uses unknown characters.
Quote

PixelToast's Photo PixelToast 14 Aug 2013

 Elrond1369, on 14 August 2013 - 10:50 AM, said:

I doesn't seem to be working. It return question marks because it tries to uses unknown characters.
nope
it works fine, (other than breaking after 255 chars because he is using modulo wrong c_c)
Quote

AgentE382's Photo AgentE382 17 Aug 2013

 PixelToast, on 14 August 2013 - 11:29 AM, said:

 Elrond1369, on 14 August 2013 - 10:50 AM, said:

I doesn't seem to be working. It return question marks because it tries to uses unknown characters.
nope
it works fine, (other than breaking after 255 chars because he is using modulo wrong c_c)

Hey, would you check my implementation for that error?

I'm pretty sure it works for large data, but it would help to get independent verification.
Quote

PixelToast's Photo PixelToast 17 Aug 2013

i already tested it, its fine and is also significantly more efficient (200%) when encrypting large amounts of data
Quote

theoriginalbit's Photo theoriginalbit 18 Aug 2013

 PixelToast, on 17 August 2013 - 08:19 PM, said:

is also significantly more efficient (200%)
Supply proof, or else people will think you've just made up that number.
Quote

PixelToast's Photo PixelToast 18 Aug 2013

i tested it with a couple os.time tests
c_c
even after my tweaks to nevercatsts to reduce function calls and fix the overflow error it took seconds to encrypt a huge amount of data
and agents took around 0.5 seconds on average
its mostly due to the fact that nevercast uses the key state table in an awkward way and he was swapping indices correctly:
local t=stuff1
stuff1=stuff2
stuff2=t
while agent did this:
stuff1,stuff2=stuff2,stuff1
i dont remember exactly what most of the results were (and i dont have the time to test it for you)

and i dont see why i had to supply proof, i said i tested it
Quote

theoriginalbit's Photo theoriginalbit 18 Aug 2013

 PixelToast, on 18 August 2013 - 01:54 PM, said:

and i dont see why i had to supply proof, i said i tested it
Because you magically pulled "200%" out of the air... And it is important that people see how numbers are calculated otherwise it could just be bias data/info...
Would you believe me if i told you that my computer was 158.746% more efficient than yours?
Quote

PixelToast's Photo PixelToast 18 Aug 2013

i did not pull 200% out of the air, that was on average how fast it completed (iirc results from 0.6-1 and 3-5) .-. i tested it, its more of a credibility issue
i would not believe your computer was more efficient because you dont have my computer at your disposal and efficiency dosent have a constant ratio for computers, that is a different thing entirely
a better example would be something like screen size (i know mine is smaller), though a lot of people posted in the post your desktop thread
Quote

NeverCast's Photo NeverCast 20 Aug 2013

Pixel, What are the issues in my script, I'll amend them :)
I'm glad it works with large data, I think that was the intention anyway.
Quote

DannySMc's Photo DannySMc 11 Mar 2016

I love this very much and I plan to use it in a new update, my only question is there anyway to fix the 245 character limit? I did testing and anything over 245 characters will break the encryption... Have you got any way to fix this? Thanks (Sorry for the necro)
Edited by DannySMc, 11 March 2016 - 11:08 AM.
Quote