[cryptography] The Unbreakable Cipher

Collin RM Stocks collin@sibilance.org
Tue Oct 1 06:54:55 PDT 2013


On 09/25/2013 03:51 PM, Jonathan Katz wrote:
> On Wed, Sep 25, 2013 at 1:30 PM, Greg Rose <ggr@seer-grog.net
> <mailto:ggr@seer-grog.net>> wrote:
>
>
>     On Sep 25, 2013, at 9:40 , Jonathan Katz <jkatz@cs.umd.edu
>     <mailto:jkatz@cs.umd.edu>> wrote:
>      > "Every cipher is breakable, given enough traffic": in principle,
>     yes, as long as the traffic (formally, the entropy of the traffic)
>     is larger than the key length.
>
>     You misstated this. It's breakable if the *redundancy* of the
>     traffic is larger than the key length.
>
>
> Not so; this is most easily seen by taking the uniform distribution over
> n-bit messages, in which case the entropy is n and the redundancy is 0.
>
>     regards,
>     Greg.
>
>
>
>
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
>

If the message is chosen from a uniform distribution over n bits (and 
assuming that the message is not used for something else after it is 
deciphered), the adversary will not be able to distinguish a correctly 
deciphered message from an incorrectly deciphered message, no matter how 
short the key is in comparison to the data.

Now, you could easily argue that there is absolutely no reason to send a 
message with those properties, but that isn't really the point.

-- 
KmNJcjeUDRXMu6riH0KAK9Og8WAaAT8oXcbnFIij5djCP4v+6GTFxnHoHzvW
NTL+4ZPiGUqerypkfsDfEOcO+i6ZlY59G79tEMwR0fsKO9w9MLbv6Odz5RxY
JZgUsZJ8lZWx/zBsL4oqU60k+EFbV14fSUVoaRpazy1ozgQFdi2SdfHTB41y
7SsMX/JlevnnBj/GhUyFlXPr2kwechOSy5W74iVbUaOpeYMqNIx3jCmZfjez
Gi+sS8ghQB8y5b9NgYTlR7HBh+leObqQX/R5bAkyPyh2oDOlFbD2HQiCsiB9
Uj/qLtG3CaZQVtkCSC1s3NschLBgWHfQ9xkb3Peqzg==



More information about the cypherpunks mailing list