Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:One-time pads (Score 1) 208

I already indicated in my last comment that you're tearing down a straw man; I didn't even mention the theoretical proof. My point is, that gibberish is sufficiently non-deterministic to still be practically secure to use as an OTP. Your reply couldn't have made that more clear, the fact that my example was't even a full-length OTP but rather regular repeated-key XOR notwithstanding.

And frankly, bitching about high user IDs, itself useless and ad-hominem, while posting anonymously? Grow a fucking pair.

PS: Check this out if you actually want to do a bit of practical messing with crypto. It might help to get out of your ivory tower once in a while.

Comment Re:One-time pads (Score 1) 208

Okay, AC. here is a base64 encoded file. It's the result of a XOR against gibberish. The original language was ASCII coded English.
The gibberish isn't even quality gibberish because i couldn't be bothered to type enough gibberish myself, so this challenge is considerably easier, even.
Since you claim with full-length gibberish it's "handing over the message on a silver platter.", this ought to be utterly trivial.

Demonstrate that besides tearing down straw-men, you actually know some of your shit, and decrypt it.

Comment Re:One-time pads (Score 1) 208

could be something as common as the Bible.

That'd be a pretty dumb idea, because IF you get to a meaningful message after XORing it with a meaningful (syntactically, anyway) message, then you can be sure that you indeed got the "real" key. The odds are, for practical purposes, exactly zero that that happened by accident.
You're right that the key doesn't need to be truly random, but it must at least be gibberish.

Slashdot Top Deals

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...