1996-10-21 - Re: OTP

Header Data

From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 06e5c07b85a6ff13501f5ef5da7eaaf8cc51987d446786245e74072d0eeb35d3
Message ID: <845910392.8251.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-10-21 15:31:15 UTC
Raw Date: Mon, 21 Oct 1996 08:31:15 -0700 (PDT)

Raw message

From: paul@fatmans.demon.co.uk
Date: Mon, 21 Oct 1996 08:31:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: OTP
Message-ID: <845910392.8251.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



> Can you explain to me how your one time pad algorithm is any better than
> encryption something with, say, RC4 or any other cipher using a key that
> is the same length as the seed for your PRNG?

Well for a start there is no possible cryptanalytic (rather than 
brute force) attack on a one time pad, the system can be 
mathematically proven to be secure with a very simple bit of 
statistics.

Soemthing like RC4, even if the key were totally random and 
unpredictable, and had as much, or more state than the message can 
still be cryptanalysed possibly, although it is unlikely...

 

  Datacomms Technologies web authoring and data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: 5BBFAEB1
     "Don`t forget to mount a scratch monkey"





Thread