1998-06-29 - Re: Finally… a One-Time-Pad implementation that works!!!

Header Data

From: Xcott Craver <caj@math.niu.edu>
To: Bryan Waters <waters@ultimateprivacy.com>
Message Hash: d20605fde7aafd2706e3d69267cae7c4cc1d6741d21308a848faa25ad12dd4e3
Message ID: <Pine.SUN.3.91.980629152953.21894A-100000@baker>
Reply To: <199806291836.OAA02926@omniwork.com>
UTC Datetime: 1998-06-29 20:35:07 UTC
Raw Date: Mon, 29 Jun 1998 13:35:07 -0700 (PDT)

Raw message

From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 29 Jun 1998 13:35:07 -0700 (PDT)
To: Bryan Waters <waters@ultimateprivacy.com>
Subject: Re: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To: <199806291836.OAA02926@omniwork.com>
Message-ID: <Pine.SUN.3.91.980629152953.21894A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 29 Jun 1998, Bryan Waters wrote:

> >TriStrata has announced that is has a product that provides OTP without the
> >pad distribution problem.  The product also has a unique key-recovery
> >system.  Check out:

	No pad distribution problem, but it has a key-recovery system,
	AND the pad is truly random?

> >http://www.tristrata.com
> >
> >for details.

	This must be a typo:  that URL doesn't contain any details.

> I wish there were more details.  Namely how they generate their 10^30 byte
> "virtual keystream".

	Which brings up one more point:  the web page mentions the
	estimated time it takes to "defeat" an encrypted message,
	via brute force.  If it really was a one-time pad, it 
	wouldn't be possible to "defeat" it by brute-force.

							-Caj





Thread