From: “Perry E. Metzger” <perry@piermont.com>
To: Simon Spero <ses@tipper.oit.unc.edu>
Message Hash: 04334f979333b9ca9d619ccbf4fe26e0ac931be0d7776439d5d23a627cc6432e
Message ID: <199511051710.MAA08683@jekyll.piermont.com>
Reply To: <Pine.SOL.3.91.951104211722.6970F-100000@chivalry>
UTC Datetime: 1995-11-05 17:21:03 UTC
Raw Date: Mon, 6 Nov 1995 01:21:03 +0800
From: "Perry E. Metzger" <perry@piermont.com>
Date: Mon, 6 Nov 1995 01:21:03 +0800
To: Simon Spero <ses@tipper.oit.unc.edu>
Subject: Re: using pgp to make an otp
In-Reply-To: <Pine.SOL.3.91.951104211722.6970F-100000@chivalry>
Message-ID: <199511051710.MAA08683@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
Simon Spero writes:
> On the subject of reused one-time-pads: What are the attacks that become
> available if a pad is used two times. The ones I can think of are:
I will point out that the NSA's VENONA project, which among other
things lead indirectly to the execution of the Rosenbergs, got its
only break from the two time use of one time pads by the Soviet
spies. I can't guess all the techniques they used, but obviously there
are enough things you can do to make it dangerous.
Perry
Return to November 1995
Return to “Simon Spero <ses@tipper.oit.unc.edu>”