why compression doesn't perfectly even out entropy

Perry E. Metzger perry at piermont.com
Thu Apr 18 22:05:40 PDT 1996



JonWienke at aol.com writes:
> [Slightly ad hominem PSA deleted]
> 
> 1.  If "cooking" a byte sequence in a manner that reduces its maximum entropy
> by less than 1% allows an attacker to break your cryptosystem, then it is
> crap to begin with.  With only a little more effort, he could break it
> anyway.

I would suggest that you look at differential and linear cryptanalysis
to learn what a tiny little statistical toehold will give you.

My "ad hominem PSA" stands. I suggest people not trust Mr. Wienke's
pronouncements. He appears to be suffering from significant hubris.

Perry






More information about the cypherpunks-legacy mailing list