Finally... a One-Time-Pad implementation that works!!!
-----BEGIN PGP SIGNED MESSAGE----- TriStrata has announced that is has a product that provides OTP without the pad distribution problem. The product also has a unique key-recovery system. Check out: http://www.tristrata.com for details. **************************************************************************** ************* PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF 4DFD 1B27 12A1 E0C4 **************************************************************************** ************* -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com> iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0 OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx 5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ== =vZmi -----END PGP SIGNATURE-----
At 05:49 PM 6/27/98 -0400, Geoffrey C. Grabow wrote:
-----BEGIN PGP SIGNED MESSAGE-----
TriStrata has announced that is has a product that provides OTP without the pad distribution problem. The product also has a unique key-recovery system. Check out:
for details.
I wish there were more details. Namely how they generate their 10^30 byte "virtual keystream". In order to be a true one-time pad the keystream needs to be completely random, this looks more like a psuedo-random stream cypher to me. But it should be fast and still might be secure. As a competing one-time pad vendor I don't want to be a pot calling the kettle black, but If I've learned anything from the cypherpunks, it's prove it. Which is what we've tried to do. Bryan Waters http://www.ultimateprivacy.com Director of Marketing Voice: 512-305-0505 Fax: 512-305-0506 Ultimate Privacy Corporation 3925 W Braker Ln #305, Austin, TX, 78759
On Mon, 29 Jun 1998, Bryan Waters wrote:
TriStrata has announced that is has a product that provides OTP without the pad distribution problem. The product also has a unique key-recovery system. Check out:
No pad distribution problem, but it has a key-recovery system, AND the pad is truly random?
for details.
This must be a typo: that URL doesn't contain any details.
I wish there were more details. Namely how they generate their 10^30 byte "virtual keystream".
Which brings up one more point: the web page mentions the estimated time it takes to "defeat" an encrypted message, via brute force. If it really was a one-time pad, it wouldn't be possible to "defeat" it by brute-force. -Caj
Great... more snake oil.... :( Geoffrey C. Grabow wrote:
-----BEGIN PGP SIGNED MESSAGE-----
TriStrata has announced that is has a product that provides OTP without the pad distribution problem. The product also has a unique key-recovery system. Check out:
for details.
**************************************************************************** ************* PGP 5.5.3 Fingerprint: 15B3 DDC1 93BB 4BDF 4DFD 1B27 12A1 E0C4 **************************************************************************** *************
-----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>
iQEVAwUBNZVo5dc2wHb8nZI1AQFqngf/bCJVbMQX/5sYb181CLONmqWjPzhQ66Ef HoyPqxRzEyq4FSWnIuQODH/YTeyyQROUqCZGhC19v8PCiZpI1ynSvn4i+Zcjv9I0 OZBThzKayNoMne7TkNr49Ah9BwDK6XuwS9bns1xM65zfKLpvKP2gboWkADD52K4w eUuJx/cTaR7PgdO/q6nrVRNq1jlaJsFBKGt2q5E1S12ZK1nA+mpKAS95XMgr2IMx 5/wJ+jsOIUTn2gWR64nhluOgmcACeIVsiRlsGqfUdL8gJHAl0gaQ7E1+HSOBx60K Ur5x5MzQKBKlWcoDaEXB1AsICW2enwdGVOxPBklq1CbcQxFXdBj1DQ== =vZmi -----END PGP SIGNATURE-----
-- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder@sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ==========================
participants (4)
-
Bryan Waters
-
Geoffrey C. Grabow
-
Ray Arachelian
-
Xcott Craver