[prev in list] [next in list] [prev in thread] [next in thread]
List: tuhs
Subject: [TUHS] OT: Patternless Encryption
From: cdl () mpl ! ucsd ! edu (Carl Lowenstein)
Date: 2003-07-08 18:22:13
Message-ID: 200307081822.h68IMDS13834 () opihi ! ucsd ! edu
[Download RAW message or body]
> From: "Joel Martinez" <president at coherent-logic.com>
> To: <tuhs at minnie.tuhs.org>
> Subject: Re: [TUHS] OT: Patternless Encryption
> Date: Tue, 8 Jul 2003 11:35:24 -0600
>
> Is it possible to do this with a fixed length key?
>
> > Such a thing exists, it is called a one-time pad. Generate a
> > completely random key as long as the plaintext, and then XOR each
> > successive bit of the key with the corresponding bit of the plaintext.
> > The result is indistinguishable from random noise; only someone with
> > an identical copy of the key can decrypt it (using precisely the same
> > method of course).
For various degrees of security, depending on the length of the key.
Keys are not used directly for encryption, but are used to generate
cryptographically secure pseudo-random sequences.
As a starting point, look at
< http://www.mindspring.com/~schlafly/crypto/faq.htm >
carl
--
carl lowenstein marine physical lab u.c. san diego
clowenst at ucsd.edu
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic