1996-02-21 - Re: Internet Privacy Guaranteed ad (POTP Jr.)

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: dan@milliways.org (Dan Bailey)
Message Hash: 9f2f9353d7bc3f2d6d93bd6a29f692db9c7b5c4f24ebdd255258e28162294e36
Message ID: <199602211545.KAA09477@jekyll.piermont.com>
Reply To: <199602211534.KAA02195@remus.ultranet.com>
UTC Datetime: 1996-02-21 17:22:57 UTC
Raw Date: Thu, 22 Feb 1996 01:22:57 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Thu, 22 Feb 1996 01:22:57 +0800
To: dan@milliways.org (Dan Bailey)
Subject: Re: Internet Privacy Guaranteed ad (POTP Jr.)
In-Reply-To: <199602211534.KAA02195@remus.ultranet.com>
Message-ID: <199602211545.KAA09477@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



Dan Bailey writes:
> My suggestion
> is to post the OTP-expansion algorithm to sci.crypt.

Call it what it is -- a pseudo-random number generator, at best. As
you likely know (but the IPG folks don't seem to care) you can't
"expand" a one time pad. One time means ONE TIME. Look at how the NSA
broke the Venona intercepts of of even two-time use of keying material.

Perry





Thread