[rc5] The DOS client appears at last!
gindrup at okway.okstate.edu
Tue Oct 28 11:13:58 EST 1997
Depends on how you define one-time-pad and how it is used.
If the plaintext is XORed against an OTP, then you are correct. If
the sender chooses to use the OTP in a "sophisticated" way, then there
is some non-negligible probability that only a handful of syntactical
messages will be produced by trying all possible sequences of inputs
to the sophisticated method.
So, to attack a OTP, hope for a "knowledgable" user.
-- Eric Gindrup ! gindrup at Okway.okstate.edu
______________________________ Reply Separator _________________________________
Subject: Re: [rc5] The DOS client appears at last!
Author: <rc5 at llamas.net > at SMTP
Date: 10/27/97 7:56 AM
>Date: Sat, 25 Oct 1997 14:15:35 +0200
>From: Jo Hermans <Jo.Hermans at vub.ac.be>
>Subject: Re: [rc5] The DOS client appears at last!
>On the other hand, you use the Bovine "brute force attack" against any
>encryption algorithm. It's just a matter of patience : some will crack
>sooner than others.
Not quite true. There will never be a successful brute force attack on
a properly implemented One Time Pad because the OTP is mathematically
secure. No technology will ever crack it.
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.
More information about the rc5