Bitcoin Forum
November 11, 2024, 08:48:03 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: Ciphersex 101 [NSFW]  (Read 560 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:04:14 AM
Last edit: March 08, 2018, 01:38:27 AM by nullius
Merited by Joel_Jantsen (2), FlightyPouch (2), actmyname (1), o_e_l_e_o (1), alia (1)
 #1

[Note:  One of my motives which led to my unlucky assocation with Alia was my desire for someone to work with for an erotic Bitcoin art project.  For now, I will leave my intentions a mystery; but girls who have really gone Bitcoin should feel free to contact me if curious.  Moreover, I will revive and continue this thread if/when I have suitable other(s) with whom to make cryptolove.  For I believe in the virtue of Ciphersex, q.v. — nullius, 2018-03-08]



I’m here with the lovely Alia.  In case you don’t yet know who she is, Alia is the saucy lass who posted this two days after signing up for the forum:

I think I'm an outlier. If I have 100 merit in 30 days, I'll eat all my words and post a vid of me masturbating to a merit infographic

Whereupon I wrote her an open letter.  We hit it off.

Alia is enthusiastic about cryptography, a subject about which I myself am passionate in every sense:  I am thrilled by the touch of numbers, the look of elliptic curves, the scent of algorithms in rut, the sound of exponential moaning, and most of all, the taste of Alia’s own private cipher.  I offered to educate her:

Of course, I’d be happy to help you increase your technical knowledge.  I’ve spent plenty of my time doing that for people who are far less—charming.  When you see what secp256k1 looks like, you’ll understand my remark about your elliptic curves:


(N.b., that’s the same equation over the real numbers, and not over a finite field as the crypto actually works. https://en.bitcoin.it/wiki/Secp256k1  Nevertheless, it’s fun.)

What is your knowledge level of cryptography concepts?  E.g., could you explain in basic (non-mathematical) terms how the ciphersuites in PGP, TLS, etc. fit together?  Symmetric cipher, asymmetric cipher, hash function, etc.  Also, concepts such as the distinctions between integrity, confidentiality, and authentication.

I can teach you all these things, and much more.  I am looking for the starting point.

Now, how better do you learn?  In my lap, or on your knees with your head betwixt my legs?  I should mention, “in my lap” involves penetration.  Penetrating insights into your most private cipher.

P.S., if I can’t make you cum whilst instructing you on ciphersuites, then I will have failed as a teacher.

P.P.S., I do like helping others.  Do you want to take this show public with a “NSFW”-marked cryptography instruction thread in Off-Topic, or would you prefer to keep this between us?  Perhaps this could drive you business.

Now, how better do you learn?  In my lap, or on your knees with your head betwixt my legs?  I should mention, “in my lap” involves penetration.  Penetrating insights into your most private cipher.

The second one please  Roll Eyes

P.S., if I can’t make you cum whilst instructing you on ciphersuites, then I will have failed as a teacher.

Lmfao.

P.P.S., I do like helping others.  Do you want to take this show public with a “NSFW”-marked cryptography instruction thread in Off-Topic, or would you prefer to keep this between us?  Perhaps this could drive you business.

Let's do it; hopefully everyone can benefit from it

P.P.S., I do like helping others.  Do you want to take this show public with a “NSFW”-marked cryptography instruction thread in Off-Topic, or would you prefer to keep this between us?  Perhaps this could drive you business.

Let's do it; hopefully everyone can benefit from it

Do you mind if I copypaste from some of our PMs thus far, to get the thread rolling?  Privacy of private communication is sacred to me (excepting scammers, threats etc.)  Thus, I would not do so without express agreement.

Whereupon, I will start writing a didactic orgasm for you.

Perfectly fine by me, you have my enthusiastic permission to reveal all of our shared secrets

Welcome thus to Ciphersex 101.



N.b., this thread is self-moderated.  I will delete posts which are disrespectful of Alia and/or myself.  I will delete posts I simply dislike.  I will delete whatever I want to.  Keep it sexy, or don’t even try posting here.

alia
Jr. Member
*
Offline Offline

Activity: 56
Merit: 115

Lowest EVER interest lending! (Use escrow always)


View Profile
February 17, 2018, 08:06:18 AM
 #2

This man is a god. I hope he can bring all of us multiple didactic orgasms

Lowest interest lending in bitcointalk history. https://bitcointalk.org/index.php?topic=2846750.0
nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:08:23 AM
 #3

Hello, Alia.  Now as I hold you in my lap and press myself against your entrance, I will teach you to authenticate my cock using public-key cryptography and a hash.

nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:11:01 AM
 #4

First, let’s get our concepts straight:

  • Authentication:  You want to be sure it’s really me down there, and not an imposter.
  • Integrity:  You want to be sure that our coital connection is not tampered with by a “Man in the Middle” attacker.
  • Confidentiality:  You want to be sure that nobody is watching our activities here.  Oops.

nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:14:08 AM
 #5

Authentication:  You want to be sure it’s really me down there, and not an imposter.

You will require me to digitally sign my cock before inserting it into you.  I will use my private key to create this signature; and you will use my public key to verify it.  Note:  This is also how Bitcoin transactions are verified.  (Yes, all Bitcoin transactions involve my cock.)

alia
Jr. Member
*
Offline Offline

Activity: 56
Merit: 115

Lowest EVER interest lending! (Use escrow always)


View Profile
February 17, 2018, 08:18:13 AM
 #6

First, let’s get our concepts straight:

  • Authentication:  You want to be sure it’s really me down there, and not an imposter.
  • Integrity:  You want to be sure that our coital connection is not tampered with by a “Man in the Middle” attacker.
  • Confidentiality:  You want to be sure that nobody is watching our activities here.  Oops.

Loving this already. I guess a threesome is out of the question

Lowest interest lending in bitcointalk history. https://bitcointalk.org/index.php?topic=2846750.0
nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:19:09 AM
 #7

Loving this already. I guess a threesome is out of the question

Secure multiparty computation?  We’ll get to that...

TMAN
Legendary
*
Offline Offline

Activity: 1414
Merit: 1808


Exchange Bitcoin quickly-https://blockchain.com.do


View Profile WWW
February 17, 2018, 08:22:53 AM
 #8

Loving this already. I guess a threesome is out of the question

Secure multiparty computation?  We’ll get to that...

I'm down for some 3 of 5 multi sig if alia brings some friends..

███████████████████████████
███████████████████████████
████████▀▀▄▄▄▄▄▄▄▀▀████████
██████▀▄██▀▀▄▄ ████▄▀██████
█████ ███ ████ ▀▀████ █████
████ █████ ███▀▀▀▄████ ████
████ ███▀▀▀▄▄▄████████ ████
████ ██▄▄▀▀███████▀▄▄█ ████
█████ █████ █▀██▀▄███ █████
██████▄▀███▀▄█▀▄███▀▄██████
████████▄▄▀▀▀ ▀▀▀▄▄████████
██████████▀▄███████████████
██████████████████████████
.
.FORTUNEJACK   JOIN INVINCIBLE JACKMATE AND WIN......10 BTC........
█████████████████████████
█████████████████████████
██████▀▀▀       ▀▀▀██████
█████  ▄▄▄█████▄▄▄  █████
█████  █████ █████  █████
█████  ██▄     ▄██  █████
█████  ████   ████  █████
█████▄  ██▄▄█▄▄██  ▄█████
██████▄  ███████  ▄██████
███████▄   ▀▀▀   ▄███████
██████████▄▄ ▄▄██████████
█████████████████████████
█████████████████████████
.
..
nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:24:10 AM
 #9

  • Integrity:  You want to be sure that our coital connection is not tampered with by a “Man in the Middle” attacker.

We will use a MAC (Message Authentication Code) to assure the integrity of all fluids exchanged.  One common example of a MAC is HMAC using a hash such as SHA-256.  HMAC is a special means of hashing together a shared secret with sexual libations a message, such that the fluids message cannot be forged by someone who knows the key.

(P.S., I meant what I said about the taste of your cipher.)

nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:28:54 AM
 #10

Confidentiality:  You want to be sure that nobody is watching our activities here.  Oops.

Well, I guess that ship has sailed.

But if we wanted to keep this carnal conversation confidential, we would encrypt it using a symmetric cipher (same key to encrypt and decrypt).  Depending on the protocol, we would either use a key agreement algorithm to establish a shared secret key across an insecure channel, as in the TLS used by your web browser (for decent ciphersuites)—or use or public keys to encrypt the symmetric key, as in PGP.

Now, which protocol are we using at present?  With you grinding in my lap, methinks the appropriate protocol is slow, deep, and hard.

nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:38:15 AM
 #11

I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 08:44:59 AM
 #12

I'm down for some 3 of 5 multi sig if alia brings some friends..

Well, Alia?  In Bitcoin multisig, we’re still talking ECC.  Have you any friends whose elliptic curves could have their public points (a/k/a “nipples”) hashed together with yours?  As Segwit fans, this will involve Pay to Witness Script Hash.  That’s more secure:  A 128-bit security level rather than an 80-bit security level in old P2SH, in case any of your friends turns out to be a malicious signer.  Also, because people are witnessing this.

(With a thread like this, I also wonder if she’s looking for a pseudorandom gang-bang.  To use technical terminology.)

alia
Jr. Member
*
Offline Offline

Activity: 56
Merit: 115

Lowest EVER interest lending! (Use escrow always)


View Profile
February 17, 2018, 08:59:48 AM
Merited by nullius (2)
 #13

I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did

Lowest interest lending in bitcointalk history. https://bitcointalk.org/index.php?topic=2846750.0
nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 09:02:42 AM
 #14

I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did

Good girl.  I hope you got good avalanche effect.  (Will explain what that means...)

nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 09:12:40 AM
 #15

I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did

Good girl.  I hope you got good avalanche effect.  (Will explain what that means...)

Consider a hash function, such as the SHA-256 algorithm used by Bitcoin in many places.  Among other properties, a cryptographically secure hash has the property that for any 1-bit change in the input, on average, 50% of the output bits flip.  See how this works:

Code:
user@host:~$ echo -n 'b' | sha256sum 
3e23e8160039594a33894f6564e1b1348bbd7a0088d42c4acb73eeaed59c009d  -
user@host:~$ echo -n 'c' | sha256sum
2e7d2c03a9507ae265ecf5b5356885a53393a2029d241394997265a1a25aefc6  -

I have here chosen 'b' and 'c' for the sake of example, because ASCII 'b' (0x62) is one bit different than 'c' (0x63).  ('a' (0x61) and 'b' (0x62) differ in 2 bits.  Well, that’s another lesson.)

Thus, as you felt the caress of my words and imagined my cock in your hot, wet cipher, every 1-bit of thrust between us should have made you feel half-scrambled with ecstasy.

Was that explanation sufficiently clear, or do I need to somehow involve a spanking?  I know you like that; and I may need to apply such measures, if you fall behind in this lesson.

alia
Jr. Member
*
Offline Offline

Activity: 56
Merit: 115

Lowest EVER interest lending! (Use escrow always)


View Profile
February 17, 2018, 09:18:58 AM
 #16

I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did

Good girl.  I hope you got good avalanche effect.  (Will explain what that means...)

Consider a hash function, such as the SHA-256 algorithm used by Bitcoin in many places.  Among other properties, a cryptographically secure hash has the property that for any 1-bit change in the input, on average, 50% of the output bits flip.  See how this works:

Code:
user@host:~$ echo -n 'b' | sha256sum 
3e23e8160039594a33894f6564e1b1348bbd7a0088d42c4acb73eeaed59c009d  -
user@host:~$ echo -n 'c' | sha256sum
2e7d2c03a9507ae265ecf5b5356885a53393a2029d241394997265a1a25aefc6  -

I have here chosen 'b' and 'c' for the sake of example, because ASCII 'b' (0x62) is one bit different than 'c' (0x63).  ('a' (0x61) and 'b' (0x62) differ in 2 bits.  Well, that’s another lesson.)

Thus, as you felt the caress of my words and imagined my cock in your hot, wet cipher, every 1-bit of thrust between us should have made you feel half-scrambled with ecstasy.

Was that explanation sufficiently clear, or do I need to somehow involve a spanking?  I know you like that; and I may need to apply such measures, if you fall behind in this lesson.

So, this implies that it's very hard to crack a private key, right? Am I understanding it correctly?

Lowest interest lending in bitcointalk history. https://bitcointalk.org/index.php?topic=2846750.0
alia
Jr. Member
*
Offline Offline

Activity: 56
Merit: 115

Lowest EVER interest lending! (Use escrow always)


View Profile
February 17, 2018, 09:19:34 AM
 #17

I'm down for some 3 of 5 multi sig if alia brings some friends..

Well, Alia?  In Bitcoin multisig, we’re still talking ECC.  Have you any friends whose elliptic curves could have their public points (a/k/a “nipples”) hashed together with yours?  As Segwit fans, this will involve Pay to Witness Script Hash.  That’s more secure:  A 128-bit security level rather than an 80-bit security level in old P2SH, in case any of your friends turns out to be a malicious signer.  Also, because people are witnessing this.

(With a thread like this, I also wonder if she’s looking for a pseudorandom gang-bang.  To use technical terminology.)

I think I'm losing you here. What exactly is an elliptic curve?

Lowest interest lending in bitcointalk history. https://bitcointalk.org/index.php?topic=2846750.0
nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 09:22:59 AM
 #18

Consider a hash function, such as the SHA-256 algorithm used by Bitcoin in many places.  Among other properties, a cryptographically secure hash has the property that for any 1-bit change in the input, on average, 50% of the output bits flip.  See how this works:

[...]

Was that explanation sufficiently clear, or do I need to somehow involve a spanking?  I know you like that; and I may need to apply such measures, if you fall behind in this lesson.

So, this implies that it's very hard to crack a private key, right? Am I understanding it correctly?

No, a hash function does not involve any private keys.  I will now briefly explain the most common types of cryptographic algorithms, and their purposes...

(Get back in my lap, and give a good grind with me in you.  You don’t deserve a spanking, because I omitted the prerequisite background information.)

nullius (OP)
Copper Member
Hero Member
*****
Offline Offline

Activity: 630
Merit: 2614


If you don’t do PGP, you don’t do crypto!


View Profile WWW
February 17, 2018, 09:25:18 AM
Last edit: February 17, 2018, 09:57:48 AM by nullius
 #19

Let’s start with the basics.  We’ll get to elliptic curves, after I fondle yours for awhile while giving a conceptual overview of public-key crypto, symmetric crypto, hash functions, etc.

Also, I have changed my mind about the spanking.  I will spank you just for fun.



Public-key ciphers

A public-key cipher uses two different keys:  A public key which is not secret (as the name implies), and a private key (also sometimes called the secret key).  These two respective keys are related by a mathematical function which lets messages encrypted to the public key be decrypted by the private key; also, by similar means, the private key can produce forgery-resistant digital signatures which can be verified using the public key.

The advantage of a public-key cipher is that the public key can be—well, it can be made public.

Bitcoin uses an elliptic-curve cryptography (ECC) cipher with curve parameters called “secp256k1”.  Remember what I said about the mathematical function which relates the public key to the private key.  Here, the function is based on something called the elliptic curve discrete logarithm problem (ECDLP).  Don’t worry about what that is right now.

A typical Bitcoin transaction must be bear a verifiable digital signature from a private key.  The corresponding public key is the basis for the type of Bitcoin address with which most users interact:  Old P2PKH (Pay To Public Key Hash; addresses starting with a “1”), or with Segwit, P2WPKH (Pay To Witness Public Key Hash).  The public key is not used directly to form the address:  Rather, it is hashed, and the hash of the public key (plus metadata) makes your Bitcoin address.

Symmetric ciphers

A symmetric cipher uses the same key for both encryption and decryption.  Obviously, this key must be kept secret!  The most commonly used symmetric cipher today is AES; you have probably heard of that.

Hashes

A hash is a one-way compression function which takes an arbitrary-length input, and produces therefrom a fixed-length output.  Take for example the SHA-256 function.  You can feed into it any arbitrary amount of sexy bits and love-bytes; and its output will always be 256 bits (that is, 32 bytes (that is more precisely, 32 octets)).

There are many types of hash functions used for different purposes in computer science.  Many, if not most hash functions are unsuitable for cryptography.  A cryptographically secure hash function must have certain properties which make it infeasible for attackers to do such things as finding two different inputs which produce the same arbitrary hash (called a collision), or finding an input which produces a certain particular hash (called a preimage attack).

I believe I do not exaggerate when I say that hashes are the single most important building block of Bitcoin.  Hashes are everywhere!  They are used to build the Merkle trees which tie together all the substantive contents of a block; they are used to produce a Merkle chain of one block to the next, i.e. this “blockchain” thing you keep hearing about; a partial preimage attack is the basis of block generation, a/k/a mining...

actmyname
Copper Member
Legendary
*
Offline Offline

Activity: 2562
Merit: 2510


Spear the bees


View Profile WWW
February 17, 2018, 10:17:52 AM
 #20

lol nullius you've done it again

Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!