1996-11-25 - Re: IPG Algorith Broken!

Header Data

From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 2943e62e77f922ebdd07ce771e90fa028ac3b0e6d6b44ecfec13a92a629f8455
Message ID: <848946795.108068.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-11-25 21:04:27 UTC
Raw Date: Mon, 25 Nov 1996 13:04:27 -0800 (PST)

Raw message

From: paul@fatmans.demon.co.uk
Date: Mon, 25 Nov 1996 13:04:27 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: IPG Algorith Broken!
Message-ID: <848946795.108068.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



>Is the concept here that:  Whereas conventional crypto generates/hashes
>a *key* with which to encode the text, IPG generates a *pad* from a key,
>more or less the length of the text, with which to encode the text??

It makes no difference whatsoever, no PRNG can have more entropy in 
the output stream than there was in the initial seed. Indeed, in 
general, the longer the PRNG runs for the more chance an adversary 
has of breaking it due to an increased amount of output.

>It seems to me they're putting an additional layer of stuff ("OTP") between
>the key generation and the actual encoding, so what's the problem with that,
>as a concept?

Well for a start it`s not a one time pad because that requires a 
totally real random pad. They have a stream cipher, as for whether it 
is any good or not I would normally not trust a man with the talent 
for bullshit Don Wood has.


  Datacomms Technologies web authoring and data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: 5BBFAEB1
     "Don`t forget to mount a scratch monkey"





Thread