From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 06e5c07b85a6ff13501f5ef5da7eaaf8cc51987d446786245e74072d0eeb35d3
Message ID: <845910392.8251.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-10-21 15:31:15 UTC
Raw Date: Mon, 21 Oct 1996 08:31:15 -0700 (PDT)
From: paul@fatmans.demon.co.uk
Date: Mon, 21 Oct 1996 08:31:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: OTP
Message-ID: <845910392.8251.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
> Can you explain to me how your one time pad algorithm is any better than
> encryption something with, say, RC4 or any other cipher using a key that
> is the same length as the seed for your PRNG?
Well for a start there is no possible cryptanalytic (rather than
brute force) attack on a one time pad, the system can be
mathematically proven to be secure with a very simple bit of
statistics.
Soemthing like RC4, even if the key were totally random and
unpredictable, and had as much, or more state than the message can
still be cryptanalysed possibly, although it is unlikely...
Datacomms Technologies web authoring and data security
Paul Bradley, Paul@fatmans.demon.co.uk
Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: 5BBFAEB1
"Don`t forget to mount a scratch monkey"
Return to October 1996
Return to “paul@fatmans.demon.co.uk”