Making One-time pad using the soundcard (fwd)
____________________________________________________________________ Before a larger group can see the virtue of an idea, a smaller group must first understand it. "Stranger Suns" George Zebrowski The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage@ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- ---------- Forwarded message ---------- Date: Wed, 14 Feb 2001 15:31:01 +0200 From: Paul N <paul_ft2@email.ro> To: cryptography@c2.net Subject: Making One-time pad using the soundcard It is secure to make a onetime pad using 16 bit input from soundcard using the following algorithm? Each bit of the output is the result of XOR-ing all 16 bits from the input sample... so, for making one byte of "one-time pad", I need 8 samples (16*8 bits or 16 bytes) of input? Of course I allow this only if the cllipping doesn't occurs and there is nosilence.... [I would not feel particularly comfortable merely combining the bits of a single sample -- distilling entropy using a hash function and large blocks of input would probably work out better. I'm sure there will be plenty of opinions around here. --Perry]
participants (1)
-
Jim Choate