Re: Making One-time pad using the soundcard

2001-02-20 Thread Ben Laurie
David Honig wrote: [I would not feel particularly comfortable merely combining the bits of a single sample -- distilling entropy using a hash function and large blocks of input would probably work out better. I'm sure there will be plenty of opinions around here. --Perry] A secure hash

Re: Making One-time pad using the soundcard

2001-02-20 Thread Carl Ellison
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 03:31 PM 2/14/01 +0200, Paul N wrote: It is secure to make a onetime pad using 16 bit input from soundcard using the following algorithm? Each bit of the output is the result of XOR-ing all 16 bits from the input sample... so, for making one

Making One-time pad using the soundcard

2001-02-17 Thread Paul N
It is secure to make a onetime pad using 16 bit input from soundcard using the following algorithm? Each bit of the output is the result of XOR-ing all 16 bits from the input sample... so, for making one byte of "one-time pad", I need 8 samples (16*8 bits or 16 bytes) of input? Of course I

Re: Making One-time pad using the soundcard

2001-02-17 Thread David Honig
At 03:31 PM 2/14/01 +0200, Paul N wrote: It is secure to make a onetime pad using 16 bit input from soundcard using the following algorithm? Each bit of the output is the result of XOR-ing all 16 bits from the input sample... so, for making one byte of "one-time pad", I need 8 samples (16*8