1997-10-05 - Re: Quor’s cipher

Header Data

From: nobody@REPLAY.COM (Anonymous)
To: cypherpunks@cyberpass.net
Message Hash: 937a60fdf172c6287cbc0a644e952f55645d674079bb5f437536e1afe62ca3c3
Message ID: <199710052058.WAA21077@basement.replay.com>
Reply To: <199710042151.WAA03454@notatla.demon.co.uk>
UTC Datetime: 1997-10-05 21:08:33 UTC
Raw Date: Mon, 6 Oct 1997 05:08:33 +0800

Raw message

From: nobody@REPLAY.COM (Anonymous)
Date: Mon, 6 Oct 1997 05:08:33 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Quor's cipher
In-Reply-To: <199710042151.WAA03454@notatla.demon.co.uk>
Message-ID: <199710052058.WAA21077@basement.replay.com>
MIME-Version: 1.0
Content-Type: text/plain



Matthew Ghio wrote:

> Antonomasia <ant@notatla.demon.co.uk> wrote:
>
> > How are you planning to detect which bytes are passed in this way ?
> > Chosen plaintext attacks would do it, and show where (a+b)^(a0+b0) == 0.
> > Looks like you've just doubled our progress.
>
> It doesn't take chosen plaintext, just known plaintext.

Even in the case where this doesn't work, you can simply collect all
128 plaintext/ciphertext pairs for the first byte (if you can get
enough known plaintexts)






Thread