One Time Pad (was: Re: [rc5] The DOS client appears at last!)

Erik Andrejko saione at primenet.com
Mon Oct 27 19:52:41 EST 1997


Since when is any OTP implementation secure?  While a theoretical OTP is
completely secure, all implementations contains weaknesses.

Erik Andrejko

At 07:27 AM 10/27/97 -0800, you wrote:
>Thompson, Christopher wrote:
>
>> >Date: Sat, 25 Oct 1997 14:15:35 +0200
>> >From: Jo Hermans <Jo.Hermans at vub.ac.be>
>> >Subject: Re: [rc5] The DOS client appears at last!
>> >
>> >On the other hand, you use the Bovine "brute force attack" against
>> any
>> >encryption algorithm. It's just a matter of patience : some will
>> crack
>> >sooner than others.
>>
>> Not quite true.  There will never be a successful brute force attack
>> on
>> a properly implemented One Time Pad because the OTP is mathematically
>> secure.  No technology will ever crack it.
>>
>
>Hmm. Never (No.. ever) is a strong word, and one that is frequently over
>used. Maybe you could explain to the laymen (such as myself) on the
>group what OTP is, and why it is completely secure (and maybe why we
>aren't all using it for encryption ;->  ).
>
>--
>|-------------------------------|
>|Chris Grantham, a.k.a. Zefram  |
>|distributed.net                |
>|4500 Cows Crunching Keys. Moo. |
>|-------------------------------|
>
>
>----
>To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5'
in the body.
>
>
----
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.



More information about the rc5 mailing list