1996-10-22 - Re: OTP

Header Data

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: c67f341b56d43889dba5590f5da2199bd7c11133a3e2623e5eab54ce78efeb92
Message ID: <67c7VD32w165w@bwalk.dm.com>
Reply To: <845910392.8251.0@fatmans.demon.co.uk>
UTC Datetime: 1996-10-22 03:20:11 UTC
Raw Date: Mon, 21 Oct 1996 20:20:11 -0700 (PDT)

Raw message

From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 21 Oct 1996 20:20:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: OTP
In-Reply-To: <845910392.8251.0@fatmans.demon.co.uk>
Message-ID: <67c7VD32w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain


Where do these idiots come from and why do they end up on this mailing list?

paul@fatmans.demon.co.uk writes:

>
> > Can you explain to me how your one time pad algorithm is any better than
> > encryption something with, say, RC4 or any other cipher using a key that
> > is the same length as the seed for your PRNG?
>
> Well for a start there is no possible cryptanalytic (rather than
> brute force) attack on a one time pad, the system can be
> mathematically proven to be secure with a very simple bit of
> statistics.

Please post your "mathematical proof" and explain what you mean by
a "brute force attack on a one time pad".

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps





Thread