why compression doesn't perfectly even out entropy
Perry E. Metzger
perry at piermont.com
Thu Apr 18 22:05:40 PDT 1996
JonWienke at aol.com writes:
> [Slightly ad hominem PSA deleted]
>
> 1. If "cooking" a byte sequence in a manner that reduces its maximum entropy
> by less than 1% allows an attacker to break your cryptosystem, then it is
> crap to begin with. With only a little more effort, he could break it
> anyway.
I would suggest that you look at differential and linear cryptanalysis
to learn what a tiny little statistical toehold will give you.
My "ad hominem PSA" stands. I suggest people not trust Mr. Wienke's
pronouncements. He appears to be suffering from significant hubris.
Perry
More information about the Testlist
mailing list