[rc5] The DOS client appears at last!

Eric Gindrup gindrup at okway.okstate.edu
Tue Oct 28 11:13:58 EST 1997


     Depends on how you define one-time-pad and how it is used.
     
     If the plaintext is XORed against an OTP, then you are correct.  If 
     the sender chooses to use the OTP in a "sophisticated" way, then there 
     is some non-negligible probability that only a handful of syntactical 
     messages will be produced by trying all possible sequences of inputs 
     to the sophisticated method.
     So, to attack a OTP, hope for a "knowledgable" user.
            -- Eric Gindrup ! gindrup at Okway.okstate.edu


______________________________ Reply Separator _________________________________
Subject: Re: [rc5] The DOS client appears at last! 
Author:  <rc5 at llamas.net > at SMTP
Date:    10/27/97 7:56 AM


>Date: Sat, 25 Oct 1997 14:15:35 +0200 
>From: Jo Hermans <Jo.Hermans at vub.ac.be>
>Subject: Re: [rc5] The DOS client appears at last! 
>
>On the other hand, you use the Bovine "brute force attack" against any 
>encryption algorithm. It's just a matter of patience : some will crack 
>sooner than others.
     
Not quite true.  There will never be a successful brute force attack on 
a properly implemented One Time Pad because the OTP is mathematically 
secure.  No technology will ever crack it.
     
     
----
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the
body.
     


----
To unsubscribe, send email to majordomo at llamas.net with 'unsubscribe rc5' in the body.



More information about the rc5 mailing list