From: Tom St Denis on
On May 2, 9:44 pm, Maaartin <grajc...(a)seznam.cz> wrote:
> On May 3, 2:38 am, Tom St Denis <t...(a)iahu.ca> wrote:
>
> > Once they address that pesky key distribution problem....
>
> It depends. I send to a customer quite a lot of encrypted emails, but
> altogether they make maybe one GB per year. I could have gone there
> five years ago and have personally brought them a DVD, and we could be
> using OTP for the whole time.
>
> But we're using PGP and I know it's far more secure than my workplace
> or their computers, etc.

That's fine and good, except that 99.999% of most crypto transactions
that occur over IP [over the net] involve at some level a PK key
agreement.

The thing to keep in mind is to NOT reply to adacrypt, or MKS, or
wtshaw, or ... because they're USELESS people. They contribute
absolutely nothing but noise and engaging them in conversation is a
waste of time.

Tom
From: Andrew Swallow on
On 03/05/2010 01:38, Tom St Denis wrote:
> On May 2, 7:38 pm, Andrew Swallow<am.swal...(a)btopenworld.com> wrote:
>> On 02/05/2010 18:08, Bruce Stephens wrote:
>> {snip}
>>
>>
>>
>>> When all's said and done, you're still talking about a symmetric cipher.
>>> (Critical readers (which seems to be everybody) would argue that it's a
>>> more or less useless symmetric cipher.)
>>
>> Computer disks with lots of storage and flash disks mean that the OTP
>> is probably now viable for email, telegraph and digital voice messages.
>> Video files may be too big.
>>
>> Andrew Swallow
>
> Once they address that pesky key distribution problem....
>
> Tom

In the case of the military, every month fly a new KV memory to each
base and ship under armed guard. Similar to the current distribution
system.

Andrew Swallow
From: Bryan on
Andrew Swallow wrote:
> Computer disks with lots of storage and flash disks mean that the OTP
> is probably now viable for email, telegraph and digital voice messages.

I think a well-engineered OTP system would be, at the very least, a
great student project. In many realistic cases the OTP should be
practical given a competent implementation. Sci.crypt has suffered
countless threads based on misunderstanding the long-ago-proven theory
of the OTP. The idiocy has drowned out the interesting problems.

Interesting problems include authentication, synchronization, and
automatically ensuring that pad data gets used only once. Eve, the
evil attacker, might introduce her own fake ciphertext, in the hope
that the user, Bob, will go around asking what the random decryption
means. If Eve can see what Bob got when he attempted to decrypt her
fake ciphertext, she can determine the part of the OTP Bob used. Then
when legitimate user Alice encrypts a secret message for Bob with that
same part of the pad, Eve spies the ciphertext and, knowing that
section of the pad, recovers plaintext. That's one example of what an
attacker might try, and we can thwart it with good crypto engineering.

We do not want to get bogged down with nonsense. How can we enjoy the
provable perfect secrecy of the OTP, for a large volume of data,
without pre-sharing a large random key-stream? We cannot. It's a
theorem. Heck, even more space here has been spent on worrying about
the chance of truly random generators producing kilobytes of all
zeros.

Realizing a practical-as-possible OTP is an interesting and worthwhile
project. The 'adacrypt' context here is obviously worse than useless.
Somewhat ironic that after all the effort sci.crypt has put into
explaining to the math-deniers the limits of the OTP, we still don't
have an OTP implementation anywhere near as practical as we know how
to build.


--
--Bryan
From: unruh on
On 2010-05-03, Andrew Swallow <am.swallow(a)btopenworld.com> wrote:
> On 03/05/2010 01:38, Tom St Denis wrote:
>> On May 2, 7:38 pm, Andrew Swallow<am.swal...(a)btopenworld.com> wrote:
>>> On 02/05/2010 18:08, Bruce Stephens wrote:
>>> {snip}
>>>
>>>
>>>
>>>> When all's said and done, you're still talking about a symmetric cipher.
>>>> (Critical readers (which seems to be everybody) would argue that it's a
>>>> more or less useless symmetric cipher.)
>>>
>>> Computer disks with lots of storage and flash disks mean that the OTP
>>> is probably now viable for email, telegraph and digital voice messages.
>>> Video files may be too big.
>>>
>>> Andrew Swallow
>>
>> Once they address that pesky key distribution problem....
>>
>> Tom
>
> In the case of the military, every month fly a new KV memory to each
> base and ship under armed guard. Similar to the current distribution
> system.

Nice if you have a few planes to spare. And then you discover 5 years
from now that the courier was making copies of all the cds and selling
them.

>
> Andrew Swallow
From: adacrypt on
On May 2, 6:08 pm, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk>
wrote:
> adacrypt <austin.oby...(a)hotmail.com> writes:
> > [...] and will not accept that cryptography has moved on from there
> > and is on the verge now of vast changes.  This is a damaging cult in
> > cryptography.  It needs to stop now.  - adacrypt
>
> When all's said and done, you're still talking about a symmetric cipher.
> (Critical readers (which seems to be everybody) would argue that it's a
> more or less useless symmetric cipher.)
>
> The *real* revolution surely started in 1976 (a little earlier in secret
> in GCHQ).  See "New Directions in Cryptography", W. Diffie and
> M. E. Hellman, IEEE Transactions on Information Theory, vol. IT-22,
> Nov. 1976, pp: 644–654, and "The First Ten Years of Public-Key
> Cryptography Whitfield Diffie", Proceedings of the IEEE, vol. 76, no. 5,
> May 1988, pp: 560–577.

Ji,
>When all's said and done, you're still talking about a symmetric cipher.
>(Critical readers (which seems to be everybody) would argue that it's a
>more or less useless symmetric cipher.)

I see nothing wrong with the OTP being a symmetric cipher - I would be
more worried if it was a (failed one-way mathematical function)
asymmetric cipher such as the RSA cipher really is - The point being
made by me is that the principles enshrined in the OTP i.e randomness
as a foil to the Kasiski/Babbage linguistic attack on the erstwhile
very strong Vigenere being used in conjunction with modern computer
science, plus one-time usage and equal key length with message length
enables a revival of this potentially very , very useful cipher
today.

This has passed unnoticed by modern designers and instead the OTP is
still being lampooned as being a kind of rueful paradox of something
that has only ironic curio value, rather like a perpetual motion side
show from the past.


Considering the mutual database technology that I am propounding (this
requires a once-in-a-lifetime secure delivery, by whatever means - in
the life of the loop that is !) secure delivery, this cipher type
i.e. using the Vigenere square algorithm, has great potential - I can
demonstrate two unbreakable ciphers to hand - these are downloadable
from my website for the doubtful reader.

It appears to me that it is more the politics of winning argumets than
being honest researchers that counts judging from the reply postings.

The OTP is dead in the water in its present form - the point being
made is that it is the launching point for other more succesful
adaptations of the same cipher from whence it came first day in the
hands of Joseph Mauborgne i.e.an adaptation of the Vigenere Cipher.

There's a lot of filibustering and bluff going in some sensitive
quarters that leads me to think "Is it a case of 'there are none as
blind as those who do not want to see'" ?

There are valuable principles in the OTP still to be taken up for
those who have the brains to see this " - Cheers - adacrypt
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11
Prev: A Randomness Hypothesis.
Next: How cool is this?