On Monday, September 25, 2017, 7:48:23 AM PDT, Marina Brown <catskillmarina@gmail.com> wrote:


On 09/25/2017 02:38 AM, jim bell wrote:
> On Sunday, September 24, 2017, 3:25:10 PM PDT, \0xDynamite
> <dreamingforward@gmail.com> wrote:
>
>
> On 8/4/17, jim bell <jdb10987@yahoo.com <mailto:jdb10987@yahoo.com>> wrote:

>>> "Vernam cipher"
>
>
>>YES!  That is the cipher.  I can't believe I forgot the name of it.
> Geez, I'm just re-realizing all of my undergrad training.
>
>
>>AFAICT, it is UNBREAKABLE if the keysize is at least half the size of
> your plaintext.
>>Marxos
>
>
>
>
> My understanding is that the keysize ought to be as long as the message
> to be encrypted.  
>
> And yes, it is unbreakable...   UNLESS you try to reuse the keys!!!
>  Google-search the word "Venona" to learn more.
>
>              Jim Bell


>Very very easy to implement too, though getting quality key material is
a bit of a hassle.



75 years ago, that was true.  Today, not.  A year ago, I saw what looked like a good implementation of a random-number generator chip.   This might have been it:       http://www.fdk.com/cyber-e/pi_ic_rpg100.html

×
250 kbps is plenty for many applications, especially since the generator could run continuously, with the output stored away and used as needed.  



>I have considered filming rough water then taking the low bits and
repacking them.


In a continuously windy area, a camera aimed at a tree with leaves would work, too.  



>I wonder if low bits from the sounds in a chicken coop would work too.


"Cluck you!!"           B^)
                         Jim Bell