From: “Perry E. Metzger” <perry@piermont.com>
To: “Jon Leonard” <jleonard@divcom.umop-ap.com>
Message Hash: 8350990b02e4a1d189ea182c2a35fb26b1aeaa1222cc7a1c56d4a7cc865097db
Message ID: <199604192048.QAA12275@jekyll.piermont.com>
Reply To: <9604191918.AA17670@divcom.umop-ap.com>
UTC Datetime: 1996-04-20 00:29:46 UTC
Raw Date: Sat, 20 Apr 1996 08:29:46 +0800
From: "Perry E. Metzger" <perry@piermont.com>
Date: Sat, 20 Apr 1996 08:29:46 +0800
To: "Jon Leonard" <jleonard@divcom.umop-ap.com>
Subject: Re: why compression doesn't perfectly even out entropy
In-Reply-To: <9604191918.AA17670@divcom.umop-ap.com>
Message-ID: <199604192048.QAA12275@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
"Jon Leonard" writes:
> Perry's right: giving up any statistical information is too much.
>
> A slightly contrived example of why tossing out duplicated bytes is bad:
>
> Suppose that a military organization is using this almost one-time-pad
> system, and my spies tell my they've fallen into the habit of sending
> "attack" and "defend" as their only 6-byte messages. This isn't a problem
> with a real one-time pad (except for traffic analysis...), but this lets
> me determine the message 3.8% of the time!
This could actually be used for traffic analysis in many instances;
you could succeed in extracting small amounts of information from the
passing data.
Any amount of leakage can in some instances be too much...
.pm
Return to April 1996
Return to “Peter Monta <pmonta@qualcomm.com>”