From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 8e32ecdc07876bad7de9151bcbb40c08a2996d06b05cceef6878f472eb8258b1
Message ID: <842976406.25087.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-09-19 05:50:24 UTC
Raw Date: Thu, 19 Sep 1996 13:50:24 +0800
From: paul@fatmans.demon.co.uk
Date: Thu, 19 Sep 1996 13:50:24 +0800
To: cypherpunks@toad.com
Subject: OTP seed solution? - strong, tried before???
Message-ID: <842976406.25087.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
A very simple idea came to me today that I`m sure has been done
before and I wanted to find out if it has any problems I haven`t
seen:
A strong random generator (ie. a BBS) is seeded with a true random
seed (derived possibly from keyboard latency) and used each time a
message is send to create a message length randon string.
This string is XOR`d or added to the message creating a OTP.
The recipient has previously been sent a seed value for the generator
encrypted under say RSA and signed to prevent a man in the middle
attack.
Each set of recipient<->sender pairs has a seed unique to them.
This seems good to me but the key distribution mess (ie. hundreds of
keys about) is the big problem, has anyone done any research into
possible solutions to this???
Datacomms Technologies web authoring and data security
Paul Bradley, Paul@fatmans.demon.co.uk
Http://www.fatmans.demon.co.uk/crypt/
"Don`t forget to mount a scratch monkey"
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.3ia
mQCNAjH9j+cAAAEEAMBvREiQR0ot9dFCO0TiSCSunAYLv2g1Bc6I3bz8FzKXNH53
6mieJf/W4rD+CxJpT0q9RQaaoRtkHJLwbjfK2il3D7mEahMAyqvF/xRJNqkXfhM3
sRJM0Jh43l+W0M5vwokbEbk25/bxWWGspTsLD3YHbzKnG6pOcL5OPIRbv66xAAUR
tCdQYXVsIEJyYWRsZXkgPHBhdWxAZmF0bWFucy5kZW1vbi5jby51az6JAJUDBRAy
NwfvNkCBjDT0xHEBATQPA/9TORmN/UjNecj03q4anpvdyCLiez5sKuNbnYK50RiP
Jj4QpWWvST3smyQ0A86DrZY/re056MXwQmARESx0rFZxdnD0oORICl5r8dJLIy3b
j8rbA5olXwZwKz73/X5s13v/pvHYX4cIsbVK8NHXqh5llSKt6TBAuGgkIGF29z5k
C4kAlQMFEDI3B9mdtf/umVkv7QEBcRYD/1FBteLqsUmr81euxqqnnrpLlyHb58B/
9sdATuua4uSjX46hXDZ264YozspNrzSB4NEdrmXOWVX3fiE0ga6XkSSkIeF23V90
En37Z0BdbFzgF00FRYTFyTq8eezQrdg/+rBPUsZUmG5wpq3e12FKHQsX01i+1mB2
YmqqwCV5e95eiQCVAgUQMh8uSb5OPIRbv66xAQEqJwP/fxQyiCasjFcbDpsFfsYp
put5cCC/9pOx6X3DlbKShPMpUOS+A9HsTEmJQN8Iawv1nSwPdtc2cR/GhW6ilVjW
LSloGdMVLabm9pGpZZMkRaZlXFUkOv7VhfgsUiL+vIDryBCAwUZCzQiWycjt/cPi
mUqFH41Z7NkyO8ZFdi5GGX0=
=CMZA
-----END PGP PUBLIC KEY BLOCK-----
Return to September 1996
Return to “paul@fatmans.demon.co.uk”