From: Xcott Craver <caj@math.niu.edu>
To: Bryan Waters <waters@ultimateprivacy.com>
Message Hash: d20605fde7aafd2706e3d69267cae7c4cc1d6741d21308a848faa25ad12dd4e3
Message ID: <Pine.SUN.3.91.980629152953.21894A-100000@baker>
Reply To: <199806291836.OAA02926@omniwork.com>
UTC Datetime: 1998-06-29 20:35:07 UTC
Raw Date: Mon, 29 Jun 1998 13:35:07 -0700 (PDT)
From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 29 Jun 1998 13:35:07 -0700 (PDT)
To: Bryan Waters <waters@ultimateprivacy.com>
Subject: Re: Finally... a One-Time-Pad implementation that works!!!
In-Reply-To: <199806291836.OAA02926@omniwork.com>
Message-ID: <Pine.SUN.3.91.980629152953.21894A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain
On Mon, 29 Jun 1998, Bryan Waters wrote:
> >TriStrata has announced that is has a product that provides OTP without the
> >pad distribution problem. The product also has a unique key-recovery
> >system. Check out:
No pad distribution problem, but it has a key-recovery system,
AND the pad is truly random?
> >http://www.tristrata.com
> >
> >for details.
This must be a typo: that URL doesn't contain any details.
> I wish there were more details. Namely how they generate their 10^30 byte
> "virtual keystream".
Which brings up one more point: the web page mentions the
estimated time it takes to "defeat" an encrypted message,
via brute force. If it really was a one-time pad, it
wouldn't be possible to "defeat" it by brute-force.
-Caj
Return to June 1998
Return to “Xcott Craver <caj@math.niu.edu>”