Saturday, August 20, 2016

Ok, guys, I'm going to sleep now :) Before I go, I want to quickly explain to all those following this without understanding chit what's about; the authority port, the world internet authorithy (port 53) runs a trellis encryption; trellis is a 3 D system of geometric figures, where each vector of the 3D has a lapse of time (TTL) until can be shut off (like gmail which only can be reopened in 300 seconds) and a velocity of bites running on diffrent paths of volume (packets) , however (this is called convunational) trellis has a file i.cnm which has a task to forward, retransmit and reset all data traffic on world internet; what I've been doing was to use the forwrd aspect, which on the last code I published is about to reverse the lenght (firewall) , when we reverse the trellis path we are making possible a forward pool; this means that this is is the midlea aspect of shutting down worldwide internet. So, I'll be here tomorrow God's wishing; and He does. see u bye bye.

1 
30 #include <itpp/base/matfunc.h>
32 #include <itpp/base/converters.h>
33 #include
34 
36 
37 namespace itpp
38 {
39 
40 // Square root of a square matrix (based on Octave sqrtm implementation)
41 cmat sqrtm(const mat& A)
42 {
43  return sqrtm(to_cmat(A));
44 }
45 
46 // Square root of the complex square matrix A
47 cmat sqrtm(const cmat& A)
48 {
49  cmat U, T;
50  schur(A, U, T);
51 
52  int n = U.rows();
53  cmat R(n, n);
54 
55  R.zeros();
56  for (int j = 0; j < n; j++)
57  R(j, j) = std::sqrt(T(j, j));
58 
59  const double fudge = std::sqrt(std::numeric_limits::min());
60 
61  for (int p = 0; p < n - 1; p++) {
62  for (int i = 0; i < n - (p + 1); i++) {
63  const int j = i + p + 1;
64  std::complex s = T(i, j);
65 
66  for (int k = i + 1; k < j; k++)
67  s -= R(i, k) * R(k, j);
68 
69  const std::complex d = R(i, i) + R(j, j) + fudge;
70  const std::complex conj_d = conj(d);
71 
72  R(i, j) = (s * conj_d) / (d * conj_d);
73  }
74  }
75 
76  return U * R * U.H();
77 }
78 
79 
80 bool all(const bvec &testvec)
81 {
82  for (int i = 0; i < testvec.length(); i++)
83  if (!testvec(i)) return false;
84  return true;
85 }
86 
87 bool any(const bvec &testvec)
88 {
89  for (int i = 0; i < testvec.length(); i++)
90  if (testvec(i)) return true;
91  return false;
92 }


Convert convolutional code polynomials to trellis description

http://www.mathworks.com/help/comm/ref/poly2trellis.html 

Friday, August 19, 2016

DNSSEC: Does the algorithm of the ZSK need to match the algorithm of the KSK?

Is it legal with DNSSEC to have differing algorithms for the ZSK and KSK? If so, how can I sign verify the zone using the standard bind DNSSEC tools with such a configuration?

...

 Well, as much as the tools complain about it, it does appear to work: dig voria.net +dnssec +multi isn't giving me any errors.

http://security.stackexchange.com/questions/80493/dnssec-does-the-algorithm-of-the-zsk-need-to-match-the-algorithm-of-the-ksk 


 

kernel, ok, microvolts code here so you don't need clusters you need a microvolt regulator


https://kernel.googlesource.com/pub/scm/linux/kernel/git/broonie/regulator/+/regulator-v4.0-rc2%5E3..regulator-v4.0-rc2/ 

ICANN selected seven people to be key holders and gave each one an actual key to Internet. It selected seven more people to be backup keyholders: so total 14 people. The physical keys unlock safety deposit boxes stashed around the world. Inside those boxes, there are smart key cards. If they all combine seven smart key cards together then they will have the “master key.” The master key may be a computer code or a password that can be used to access the ICANN database.

ICANN has released the list of trusted community representatives who will participate in the root key generation and signing ceremonies, the first of which will take place tomorrow, June 16, in Culpeper, Virginia.  (An FAQ on the trusted community representatives can be found here.)  Following is the complete list, although ICANN notes that backups may be called in if needed:
Crypto Officers for the US East Coast Facility
  • Alain Aina, BJ
  • Anne-Marie Eklund Löwinder, SE
  • Federico Neves, BR
  • Gaurab Upadhaya, NP
  • Olaf Kolkman, NL
  • Robert Seastrom, US
  • Vinton Cerf, US
Crypto Officers for the US West Coast Facility
  • Andy Linton, NZ
  • Carlos Martinez, UY
  • Dmitry Burkov, RU
  • Edward Lewis, US
  • João Luis Silva Damas, PT
  • Masato Minda, JP
  • Subramanian Moonesamy, MU
Recovery Key Share Holders
  • Bevil Wooding, TT
  • Dan Kaminsky, US
  • Jiankang Yao, CN
  • Moussa Guebre, BF
  • Norm Ritchie, CA
  • Ondřej Surý, CZ
  • Paul Kane, UK
Backup Crypto Officers
  • Christopher Griffiths, US
  • Fabian Arbogast, TZ
  • John Curran, US
  • Nicolas Antoniello, UY
  • Rudolph Daniel, UK
  • Sarmad Hussain, PK
  • Ólafur Guðmundsson, IS
Backup Recovery Key Share Holders
  • David Lawrence, US
  • Dileepa Lathsara, LK
  • Jorge Etges, BR
  • Kristian Ørmen, DK
  • Ralf Weber, DE
  • Warren Kumari, US