new idea for random number generation

jim bell jdb10987 at yahoo.com
Wed Sep 27 11:00:37 PDT 2017


 On Wednesday, September 27, 2017, 7:24:22 AM PDT, \0xDynamite <dreamingforward at gmail.com> wrote:
 
 
 >>>Well if they don't know the key length, then using somewhere between
>>> 1/3 and 2/3 should make it unbreakable.
>
>> No, using the full length is necessary.  Using a key length less than the
>> full length of the message is very dangerous.

>Hmm, as far as I'm aware, you can't do cryptanalysis on 2 characters.
>Marxos
A factoid which is irrelevant in this context.  
If you only wanted to encrypt two characters, once, you could use ROT-13 and nobody would be the wiser.  
             Jim Bell

  
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1662 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20170927/a0f3d3f8/attachment.txt>


More information about the cypherpunks mailing list