Making One-time pad using the soundcard (fwd)

Jim Choate ravage at einstein.ssz.com
Sat Feb 17 16:34:28 PST 2001




    ____________________________________________________________________

           Before a larger group can see the virtue of an idea, a
           smaller group must first understand it.

                                           "Stranger Suns"
                                           George Zebrowski

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------

---------- Forwarded message ----------
Date: Wed, 14 Feb 2001 15:31:01 +0200
From: Paul N <paul_ft2 at email.ro>
To: cryptography at c2.net
Subject: Making One-time pad using the soundcard


It is secure to make a onetime pad using 16 bit input from soundcard using the 
following algorithm?

Each bit of the output is the result of XOR-ing all 16 bits from the input 
sample... so, for making one byte of "one-time pad", I need 8 samples (16*8 
bits or 16 bytes) of input?

Of course I allow this only if the cllipping doesn't occurs and there is 
nosilence....

[I would not feel particularly comfortable merely combining the bits
of a single sample -- distilling entropy using a hash function and
large blocks of input would probably work out better. I'm sure there
will be plenty of opinions around here. --Perry]





More information about the cypherpunks-legacy mailing list