[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: OTP
> Where do these idiots come from and why do they end up on this mailing list?
I have asked myself the same question many a time when reading your
inane and witless postings
> > > Can you explain to me how your one time pad algorithm is any better than
> > > encryption something with, say, RC4 or any other cipher using a key that
> > > is the same length as the seed for your PRNG?
> >
> > Well for a start there is no possible cryptanalytic (rather than
> > brute force) attack on a one time pad, the system can be
> > mathematically proven to be secure with a very simple bit of
> > statistics.
The proof is intuitive, if there is equal or greater entropy in the
pad as there is in the message and the pad is used in a proper OPT
fashion (never repeating) there is no way to determine the correct
decryption, as simple as that doctor fuckup.
As for when I said brute force, fault admitted, I was probably
thinking about a stream cipher or something, as you know as well as
me (or probably don`t as you know nothing about cryptography) there
is no concept of a brute force attack on an OTP as there are many
correct decryptions for different pads.
Datacomms Technologies web authoring and data security
Paul Bradley, [email protected]
[email protected], [email protected]
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: 5BBFAEB1
"Don`t forget to mount a scratch monkey"