Making One-time pad using the soundcard (fwd)
Jim Choate
ravage at einstein.ssz.com
Sat Feb 17 16:34:28 PST 2001
____________________________________________________________________
Before a larger group can see the virtue of an idea, a
smaller group must first understand it.
"Stranger Suns"
George Zebrowski
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage at ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------
---------- Forwarded message ----------
Date: Wed, 14 Feb 2001 15:31:01 +0200
From: Paul N <paul_ft2 at email.ro>
To: cryptography at c2.net
Subject: Making One-time pad using the soundcard
It is secure to make a onetime pad using 16 bit input from soundcard using the
following algorithm?
Each bit of the output is the result of XOR-ing all 16 bits from the input
sample... so, for making one byte of "one-time pad", I need 8 samples (16*8
bits or 16 bytes) of input?
Of course I allow this only if the cllipping doesn't occurs and there is
nosilence....
[I would not feel particularly comfortable merely combining the bits
of a single sample -- distilling entropy using a hash function and
large blocks of input would probably work out better. I'm sure there
will be plenty of opinions around here. --Perry]
More information about the cypherpunks-legacy
mailing list