Isn't that equivalent to sender doing XOR on the plaintext, recipient doing
XOR on first ciphertext, sender doing another XOR on second ciphertext to
create third ciphertext, and the recipient doing XOR again to get plaintext?

That's key-reuse and breaks XOR/OTP. The middleman simply XORs the
ciphertexts with each other to get the key and then decrypts the first
ciphertext. He just simply needs to record all ciphertexts. The same basic
method applies for the noise application/removal.
Den 13 jun 2013 17:31 skrev "Leandro Meiners" <[email protected]>:

> Koenig's idea is interesting, and with a small twist I think could have
> worked. If instead of only applying noise at the receiving end, noise was
> first applied by the sender, then the recipient applies his own noise and
> sends it back to the sender, who then subtracts his original noise and
> sends it back "encrypted" with the recipient's noise who can now decrypt
> it....
>
> Cheers,
> Leandro.-
>
>
> On Thu, Jun 13, 2013 at 3:31 PM, John Young <[email protected]> wrote:
>
>> Old Mystery Solved: Project C-43 and Public Key Encryption:
>>
>> http://techpinions.com/an-old-**mystery-solved-project-c-43-**
>> and-public-key-encryption/**18205<http://techpinions.com/an-old-mystery-solved-project-c-43-and-public-key-encryption/18205>
>>
>>
>> ______________________________**_________________
>> cryptography mailing list
>> [email protected]
>> http://lists.randombit.net/**mailman/listinfo/cryptography<http://lists.randombit.net/mailman/listinfo/cryptography>
>>
>
>
>
> --
> Leandro Federico Meiners
>
> _______________________________________________
> cryptography mailing list
> [email protected]
> http://lists.randombit.net/mailman/listinfo/cryptography
>
>
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to