OTP

paul at fatmans.demon.co.uk paul at fatmans.demon.co.uk
Mon Oct 21 08:31:15 PDT 1996



> Can you explain to me how your one time pad algorithm is any better than
> encryption something with, say, RC4 or any other cipher using a key that
> is the same length as the seed for your PRNG?

Well for a start there is no possible cryptanalytic (rather than 
brute force) attack on a one time pad, the system can be 
mathematically proven to be secure with a very simple bit of 
statistics.

Soemthing like RC4, even if the key were totally random and 
unpredictable, and had as much, or more state than the message can 
still be cryptanalysed possibly, although it is unlikely...

 

  Datacomms Technologies web authoring and data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: 5BBFAEB1
     "Don`t forget to mount a scratch monkey"






More information about the cypherpunks-legacy mailing list