1996-04-19 - Re: why compression doesn’t perfectly even out entropy

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: Peter Monta <pmonta@qualcomm.com>
Message Hash: eafb2861f250a1100911ec5e854993545bf4811525f7c2a42ad459c02bb97b59
Message ID: <199604191221.IAA11773@jekyll.piermont.com>
Reply To: <199604190607.XAA17848@mage.qualcomm.com>
UTC Datetime: 1996-04-19 18:42:08 UTC
Raw Date: Sat, 20 Apr 1996 02:42:08 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Sat, 20 Apr 1996 02:42:08 +0800
To: Peter Monta <pmonta@qualcomm.com>
Subject: Re: why compression doesn't perfectly even out entropy
In-Reply-To: <199604190607.XAA17848@mage.qualcomm.com>
Message-ID: <199604191221.IAA11773@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



Peter Monta writes:
> No, he's correct; cryptanalytic schemes like those you mention rely
> on statistical toeholds *in the context of a deterministic cipher
> algorithm*.  For one-time pads that are "cooked" or "screened" (and
> I agree that it's a silly thing to do), the toehold is much weaker,
> infinitesimal in fact.

Please learn what the context of the discussion was before
commenting. It was not about using cooked streams for one time pads.

Furthermore, I suggest you look up the Venona intercept work and tell
me again about how far an advesary will go with a tiny toehold.

.pm





Thread