Pages:
Author

Topic: Ciphersex 101 [NSFW] (Read 573 times)

copper member
Activity: 1330
Merit: 899
🖤😏
March 23, 2018, 04:38:39 PM
#37
Hey nullius, I have found alia, though without any makeup.
.

Looks like somebody else is doing her so hard whilst talking about cryptography.
member
Activity: 140
Merit: 11
March 21, 2018, 11:58:50 AM
#36
Funny project
copper member
Activity: 23
Merit: 4
Meretrix Conceptions, Disincorporated
March 21, 2018, 11:06:03 AM
#35
Because I am a tease:

Loading teaser...


Watch me if you want.

❤️ The Meretrix





Damn nullius,you are giving me multiple organisms with all those cipherSex talks.I'm really considering my gender preferences having two genders in the same room and I'm not impressed by the opposite.

Code:
#ifndef SUSPENDED_DISBELIEF

Thank you, Joel_Jantsen.  As for disappointment with how this thread turned out, perhaps I may suggest an elegant segue to something better:  Although I’m not “bendy” that way, I can produce fictional characters of the opposite sex just as well as any other skilled author.  Consider this to be a spark which may feed the flame of a living quasi-novel I conceived some months ago.

Moreover, with luck and patience, I may perhaps come to publish bits from real “girls gone Bitcoin” through my editorial control of this account.  In my experience, (actual) women are drawn by “literotica” just as men are drawn by nudie pics.  I invite contact from women who desire to publish bits of themselves; and I offer protection of anonymity for those who need it.  For secure discussion of sexy secrets, use PGP!

I shall lock this thread soon, but fear not:  My own brand of CS 101 shall continue, elsewhere and in other forms.

(P.S.—When in doubt, check trust pages!)

Code:
#endif /* !SUSPENDED_DISBELIEF */
legendary
Activity: 1988
Merit: 1317
Get your game girl
March 08, 2018, 01:34:35 AM
#34
Damn nullius,you are giving me multiple organisms with all those cipherSex talks.I'm really considering my gender preferences having two genders in the same room and I'm not impressed by the opposite.
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 09:43:15 AM
#33
Fuck yes. And if I ever ask a dumb question, I want you to spank me hard - harder than it is to convince a Bcash supporter to use SegWit.

Well, that’s not a metaphor for a spanking.  That speaks to cattle prod territory.

Go ahead with your questions.  I am waiting—I have myself in hand waiting, so to speak.  No, hold up:  One more thing first.  Take your fingers out of yourself, and suck on them for a moment.  Then put them back, describe to me how they tasted—and then ask your cryptography questions.
jr. member
Activity: 56
Merit: 115
Lowest EVER interest lending! (Use escrow always)
February 17, 2018, 09:32:50 AM
#32
Oh nullius, you're the only man who holds the password to my admin console. Now decrypt my cipher and let's make hot, sweet love

I do believe that you would be thrilled to chat about cryptography whilst I fuck you so hard, you nearly pass out when you cum.

(Did I say “nearly”?  My mistake.)

If I’m right—and I know I am—then I want you to tell your adoring audience how right I am.  Do this by slipping two fingers inside yourself, exactly where you most yearn for me, and then using your other hand to tap out an intelligent question following on one of my above crypto explanations.

Don’t be embarrassed about being a beginner.  We all were, at some point.  (I know you won’t be embarrassed to have everybody watch you masturbate while stammering out applied cryptography questions to me, and listening to the answers.  I know that only augments the thrill for you!)

Fuck yes. And if I ever ask a dumb question, I want you to spank me hard - harder than it is to convince a Bcash supporter to use SegWit.
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 09:29:56 AM
#31
Oh nullius, you're the only man who holds the password to my admin console. Now decrypt my cipher and let's make hot, sweet love

I do believe that you would be thrilled to chat about cryptography whilst I fuck you so hard, you nearly pass out when you cum.

(Did I say “nearly”?  My mistake.)

If I’m right—and I know I am—then I want you to tell your adoring audience how right I am.  Do this by slipping two fingers inside yourself, exactly where you most yearn for me, and then using your other hand to tap out an intelligent question following on one of my above crypto explanations.

Don’t be embarrassed about being a beginner.  We all were, at some point.  (I know you won’t be embarrassed to have everybody watch you masturbate while stammering out applied cryptography questions to me, and listening to the answers.  I know that only augments the thrill for you!)
jr. member
Activity: 56
Merit: 115
Lowest EVER interest lending! (Use escrow always)
February 17, 2018, 09:20:16 AM
#30
I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.

Mathematically sound logic. Guess we have to do it: you know what they say, code is law!

Spread ’em, and I’ll kiss your law right now.  I know that’s the code which rules you—Alia.

Oh nullius, you're the only man who holds the password to my admin console. Now decrypt my cipher and let's make hot, sweet love
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 09:18:43 AM
#29
I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.

Mathematically sound logic. Guess we have to do it: you know what they say, code is law!

Spread ’em, and I’ll kiss your law right now.  I know that’s the code which rules you—Alia.
jr. member
Activity: 56
Merit: 115
Lowest EVER interest lending! (Use escrow always)
February 17, 2018, 09:12:54 AM
#28
Bitcoin talk aside, you're actually making me really horny xD

Well, fair’s fair.  You’re doing the same to me.

I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.

Mathematically sound logic. Guess we have to do it: you know what they say, code is law!
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 09:07:53 AM
#27
Bitcoin talk aside, you're actually making me really horny xD

Well, fair’s fair.  You’re doing the same to me.

I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.
jr. member
Activity: 56
Merit: 115
Lowest EVER interest lending! (Use escrow always)
February 17, 2018, 08:59:21 AM
#26
Can't wait to receive transactions from you hard and fast. And in nine months, maybe we'll have a new multisig wallet.

Well, there’s something which will grow in value.

Now that you’ve got me hard, and I mean NP-COMPLETE hard, I want for you to wrap those luscious legs of yours around me for a horizontal dance as I fill you up with me.  Let’s establish a rhythm with my continuing description of hash functions...

Bitcoin talk aside, you're actually making me really horny xD
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 08:48:27 AM
#25
Can't wait to receive transactions from you hard and fast. And in nine months, maybe we'll have a new multisig wallet.

Well, there’s something which will grow in value.

Now that you’ve got me hard, and I mean NP-COMPLETE hard, I want for you to wrap those luscious legs of yours around me for a horizontal dance as I fill you up with me.  Let’s establish a rhythm with my continuing description of hash functions...
jr. member
Activity: 56
Merit: 115
Lowest EVER interest lending! (Use escrow always)
February 17, 2018, 08:13:57 AM
#24
Thanks! I'll be back in a few hours, looking forward to you exploring deeper depths of my cipher with all of your keys (start with public and end with private, please)

The key between my legs shall decrypt the cipher betwixt yours, o Alia.

Till then, your homework is to solemnly contemplate how many readers are pleasuring themselves whilst watching you learn the basics of applied cryptography.  Protip:  Kerckhoffs’ Principle states that the security of a cryptosystem must rely solely on the secrecy of the secret key; whereas the cipher may be known to all.  Published in papers.  Released on the Internet.

My key is secret:  There are no (unencrypted) photos of it on the Internet.  Whereas your cipher is quite public, is it not, my dear exhibitionist meretrix?  Does the thought thrill you?  I know it does, but please do say.  I’m not the only one who wants to hear it.  How much do you enjoy Kerckoffs’ Principle, as applied to you?

Aside—I noticed you advertise some kink.  The security of the Bitcoin mining system (based on Hashcash) relies on something called a partial preimage bruteforce attack.  We’ll get to that later, if you’re naughty.  Also, if you’re nice.


This is better than Shakespeare.

Oh, really?  Have you forgotten Shakespeare’s evident taste for the taste of a woman’s cipher?

Quote from: William Shakespeare
Hamlet: Lady, shall I lie in your lap?

Lying down at OPHELIA's feet

Ophelia: No, my lord.

Hamlet: I mean, my head upon your lap?

Ophelia: Ay, my lord.

Hamlet: Do you think I meant country matters?

Ophelia: I think nothing, my lord.

Hamlet: That's a fair thought to lie between maids’ legs.

...or...

Quote from: William Shakespeare
“Fondling,” she saith, “since I have hemm’d thee here
Within the circuit of this ivory pale,
I’ll be a park, and thou shalt be my deer;
Feed where thou wilt, on mountain or in dale:
   Graze on my lips, and if those hills be dry,
   Stray lower, where the pleasant fountains lie.

Etc...  There is plenty of sexy Shakespeare scattered about.  Oh, and Alia, I hope that gives you some idea of what I plan to do to you.

Can't wait to receive transactions from you hard and fast. And in nine months, maybe we'll have a new multisig wallet.
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 07:32:29 AM
#23
Thanks! I'll be back in a few hours, looking forward to you exploring deeper depths of my cipher with all of your keys (start with public and end with private, please)

The key between my legs shall decrypt the cipher betwixt yours, o Alia.

Till then, your homework is to solemnly contemplate how many readers are pleasuring themselves whilst watching you learn the basics of applied cryptography.  Protip:  Kerckhoffs’ Principle states that the security of a cryptosystem must rely solely on the secrecy of the secret key; whereas the cipher may be known to all.  Published in papers.  Released on the Internet.

My key is secret:  There are no (unencrypted) photos of it on the Internet.  Whereas your cipher is quite public, is it not, my dear exhibitionist meretrix?  Does the thought thrill you?  I know it does, but please do say.  I’m not the only one who wants to hear it.  How much do you enjoy Kerckoffs’ Principle, as applied to you?

Aside—I noticed you advertise some kink.  The security of the Bitcoin mining system (based on Hashcash) relies on something called a partial preimage bruteforce attack.  We’ll get to that later, if you’re naughty.  Also, if you’re nice.


This is better than Shakespeare.

Oh, really?  Have you forgotten Shakespeare’s evident taste for the taste of a woman’s cipher?

Quote from: William Shakespeare
Hamlet: Lady, shall I lie in your lap?

Lying down at OPHELIA's feet

Ophelia: No, my lord.

Hamlet: I mean, my head upon your lap?

Ophelia: Ay, my lord.

Hamlet: Do you think I meant country matters?

Ophelia: I think nothing, my lord.

Hamlet: That's a fair thought to lie between maids’ legs.

...or...

Quote from: William Shakespeare
“Fondling,” she saith, “since I have hemm’d thee here
Within the circuit of this ivory pale,
I’ll be a park, and thou shalt be my deer;
Feed where thou wilt, on mountain or in dale:
   Graze on my lips, and if those hills be dry,
   Stray lower, where the pleasant fountains lie.

Etc...  There is plenty of sexy Shakespeare scattered about.  Oh, and Alia, I hope that gives you some idea of what I plan to do to you.
legendary
Activity: 2268
Merit: 18771
February 17, 2018, 07:00:55 AM
#22
This is better than Shakespeare.
jr. member
Activity: 56
Merit: 115
Lowest EVER interest lending! (Use escrow always)
February 17, 2018, 05:58:08 AM
#21
Let’s start with the basics.  We’ll get to elliptic curves, after I fondle yours for awhile while giving a conceptual overview of public-key crypto, symmetric crypto, hash functions, etc.

Also, I have changed my mind about the spanking.  I will spank you just for fun.



Public-key ciphers

A public-key cipher uses two different keys:  A public key which is not secret (as the name implies), and a private key (also sometimes called the secret key).  These two respective keys are related by a mathematical function which lets messages encrypted to the public key be decrypted by the private key; also, by similar means, the private key can produce forgery-resistant digital signatures which can be verified using the public key.

The advantage of a public-key cipher is that the public key can be—well, it can be made public.

Bitcoin uses an elliptic-curve cryptography (ECC) cipher with curve parameters called “secp256k1”.  Remember what I said about the mathematical function which relates the public key to the private key.  Here, the function is based on something called the elliptic curve discrete logarithm problem (ECDLP).  Don’t worry about what that is right now.

A typical Bitcoin transaction must be bear a verifiable digital signature from a private key.  The corresponding public key is the basis for the type of Bitcoin address with which most users interact:  Old P2PKH (Pay To Public Key Hash; addresses starting with a “1”), or with Segwit, P2WPKH (Pay To Witness Public Key Hash).  The public key is not used directly to form the address:  Rather, it is hashed, and the hash of the public key (plus metadata) makes your Bitcoin address.

Symmetric ciphers

A symmetric cipher uses the same key for both encryption and decryption.  Obviously, this key must be kept secret!  The most commonly used symmetric cipher today is AES; you have probably heard of that.

Hashes

A hash is a one-way compression function which takes an arbitrary-length input, and produces therefrom a fixed-length output.  Take for example the SHA-256 function.  You can feed into it any arbitrary amount of sexy bits and love-bytes; and its output will always be 256 bits (that is, 32 bytes (that is more precisely, 32 octets)).

There are many types of hash functions used for different purposes in computer science.  Many, if not most hash functions are unsuitable for cryptography.  A cryptographically secure hash function must have certain properties which make it infeasible for attackers to do such things as finding two different inputs which produce the same arbitrary hash (called a collision), or finding an input which produces a certain particular hash (called a preimage attack).

I believe I do not exaggerate when I say that hashes are the single most important building block of Bitcoin.  Hashes are everywhere!  They are used to build the Merkle trees which tie together all the substantive contents of a block; they are used to produce a Merkle chain of one block to the next, i.e. this “blockchain” thing you keep hearing about; a partial preimage attack is the basis of block generation, a/k/a mining...

Thanks! I'll be back in a few hours, looking forward to you exploring deeper depths of my cipher with all of your keys (start with public and end with private, please)
copper member
Activity: 2562
Merit: 2510
Spear the bees
February 17, 2018, 05:17:52 AM
#20
lol nullius you've done it again
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 04:25:18 AM
#19
Let’s start with the basics.  We’ll get to elliptic curves, after I fondle yours for awhile while giving a conceptual overview of public-key crypto, symmetric crypto, hash functions, etc.

Also, I have changed my mind about the spanking.  I will spank you just for fun.



Public-key ciphers

A public-key cipher uses two different keys:  A public key which is not secret (as the name implies), and a private key (also sometimes called the secret key).  These two respective keys are related by a mathematical function which lets messages encrypted to the public key be decrypted by the private key; also, by similar means, the private key can produce forgery-resistant digital signatures which can be verified using the public key.

The advantage of a public-key cipher is that the public key can be—well, it can be made public.

Bitcoin uses an elliptic-curve cryptography (ECC) cipher with curve parameters called “secp256k1”.  Remember what I said about the mathematical function which relates the public key to the private key.  Here, the function is based on something called the elliptic curve discrete logarithm problem (ECDLP).  Don’t worry about what that is right now.

A typical Bitcoin transaction must be bear a verifiable digital signature from a private key.  The corresponding public key is the basis for the type of Bitcoin address with which most users interact:  Old P2PKH (Pay To Public Key Hash; addresses starting with a “1”), or with Segwit, P2WPKH (Pay To Witness Public Key Hash).  The public key is not used directly to form the address:  Rather, it is hashed, and the hash of the public key (plus metadata) makes your Bitcoin address.

Symmetric ciphers

A symmetric cipher uses the same key for both encryption and decryption.  Obviously, this key must be kept secret!  The most commonly used symmetric cipher today is AES; you have probably heard of that.

Hashes

A hash is a one-way compression function which takes an arbitrary-length input, and produces therefrom a fixed-length output.  Take for example the SHA-256 function.  You can feed into it any arbitrary amount of sexy bits and love-bytes; and its output will always be 256 bits (that is, 32 bytes (that is more precisely, 32 octets)).

There are many types of hash functions used for different purposes in computer science.  Many, if not most hash functions are unsuitable for cryptography.  A cryptographically secure hash function must have certain properties which make it infeasible for attackers to do such things as finding two different inputs which produce the same arbitrary hash (called a collision), or finding an input which produces a certain particular hash (called a preimage attack).

I believe I do not exaggerate when I say that hashes are the single most important building block of Bitcoin.  Hashes are everywhere!  They are used to build the Merkle trees which tie together all the substantive contents of a block; they are used to produce a Merkle chain of one block to the next, i.e. this “blockchain” thing you keep hearing about; a partial preimage attack is the basis of block generation, a/k/a mining...
copper member
Activity: 630
Merit: 2614
If you don’t do PGP, you don’t do crypto!
February 17, 2018, 04:22:59 AM
#18
Consider a hash function, such as the SHA-256 algorithm used by Bitcoin in many places.  Among other properties, a cryptographically secure hash has the property that for any 1-bit change in the input, on average, 50% of the output bits flip.  See how this works:

[...]

Was that explanation sufficiently clear, or do I need to somehow involve a spanking?  I know you like that; and I may need to apply such measures, if you fall behind in this lesson.

So, this implies that it's very hard to crack a private key, right? Am I understanding it correctly?

No, a hash function does not involve any private keys.  I will now briefly explain the most common types of cryptographic algorithms, and their purposes...

(Get back in my lap, and give a good grind with me in you.  You don’t deserve a spanking, because I omitted the prerequisite background information.)
Pages:
Jump to: