OTP dual decryption

Sameer zane at genesis.mcs.com
Mon Jun 21 11:34:40 PDT 1993


In message <93Jun21.003959pdt.14001-3 at well.sf.ca.us>, "George A. Gleason" writes:
>
> interesting... If I understand you; it's keep your DES key in your head, and
> use the DES cyphertext to create an appropriate OTP key that decrypts back
> to something innocuous.  good.  The thing is, to make this credible, we
> still need an OTP program which is in general use for communications.  
	Yeah. OTP's seem awfully cumbersome.

> 
> Now here's another possible problem.  Let's say that They are tapping you
> and grab all the cyphertext of your actual communications.  Now they grab
> your hard drive and what they get is a different batch of cyphertext.  That
> in and of itself might call up some suspicions.  Any solution in sight...?
	Hmm? I don't understand this problem. There's only one set of
cyphertext.. the actual cyphertext. Do you mean "different batch of
cyphertext" as the OTP which creates the innocuous plaintext from the
cyphertext? Maybe encrypt the OTP w/DES and keep it on your hard drive.
When "they" snag the drive, they see the different cyphertext, you tell
them that it's the OTP you used and give them the DES-key to decrypt the
innocuous OTP.
	I sense a problem with histogram equalization, however. Is there a
problem here or does OTP-encryption take care of that? 

--
| Sameer Parekh-zane at genesis.MCS.COM-PFA related mail to pfa at genesis.MCS.COM |
| Apprentice Philosopher, Writer, Physicist, Healer, Programmer, Lover, more |
| "Symbiosis is Good" - Me_"Specialization is for Insects" - R. A. Heinlein_/
 \_______________________/ \______________________________________________/ 






More information about the cypherpunks-legacy mailing list