[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: "power one time pad"
>This is the most confusing part of the whole thing.. How does it get started.
>unfortunately, as this is embroiled in non-disclosure and patent-pending,
>we're not going to know, but are forced to take the word of experts such
>as David Kahn that it works as advertised.
Has David Kahn made such a statement? Where can I read the context in which it
was made? Kahn is a historian of cryptography, not a cryptographer.
On the basis of the documents made avaliable to me it looks like the standard
linear feedback sequence generator hack. It does not appear to be a one time pad
system in anything but name.
>Yes, I and a friend of mine were the only two people in the audience
>that were not Journalists. It does look rather intruguing, but so much
>negativism is flying about, that most people have dismissed it out of hand.
Often the best thing to do. I don't know who designed POTP nor what they created
but if I use it and it fails I take the risk. Note that in the Mondex case if it
fails Mondex take the hit.
As a final point one the security of one time pads is only guaranteed as long as
the pads are never reused in any sense whatsoever. The system is exceptionaly
fragile, the slightest breach of secuirty can destroy it, consider the Venona
decrypts for example.
I'm thinking of writing a paper "How One Time Pads Fail" to discuss failures of
"unbreakable systems". I have some new material on how to copy the Venona
cracking method and also plan to analyse POTP and a few other alledged one time
pad systems. If anyone knows of other alledged one time pad systems that weren't
please email me and I'll include them.
Phill