The purpose of this false positive is to demonstrate both the simplicity and complexity of the ltwpsyn™ algorithm. Using Pi as an example it is possible to
reverse engineer almost any result. This is a practical demonstration of the statement in 2.1 Complexity vs Simplicity
Keywords: World Wide Web, Encrypt the Internet,
A practical guide to encryption of the internet, ltwpsyn encryption
1. Procedure
(Note: This demonstration will use a POC developed in 1998. A Reader program is available for this example upon request here
Request a Reader for False/Positive Example. ) the decryption results available with the reader are:
eureka : what Archimedes was suppose to have said when he worked out displacement in the bath . . .
lasciate ogni speranza, voi ch'entrate : Dante's inferno canto III line 9 . . .
i love you : because that is what you get with an ltwpsyn google search google search: ltwpsyn
This demonstration will be of the "I love you" result, in the following parts
get Pi from the internet, it is available at many webpages, I have used this page:
show the keystroke mixing sequence with original cipher, and cipher after reverse engineering
show the reverse engineering allocation tables for the 3 required Results
show how the line mixing sequence and keystroke cipher and Pi create the result
1.1 Get information to unencrypt (Pi)
Pi (π) should simulate a random number here is Pi from the internet site, converted to 80 characters per line and the decimal place removed
here is Pi after the line sequence unmixing procedure, note new line 1
1.2 The keystroke mixing sequence with original cipher, and cipher after reverse engineering
1.3 The reverse engineering allocation tables
1.4 How the line mixing sequence and keystroke cipher and Pi create the result