----- Forwarded message from coderman <coder...@gmail.com> -----

Date: Wed, 25 Sep 2013 23:38:58 -0700
From: coderman <coder...@gmail.com>
To: brian carroll <electromagnet...@gmail.com>
Cc: cpunks <cypherpu...@cpunks.org>
Subject: Re: The Unbreakable Cipher (2)

On Wed, Sep 25, 2013 at 9:29 PM, brian carroll
<electromagnet...@gmail.com> wrote:
> ...
>  no- not for a multilinear/nonlinear bit set approach. voluminous data
> exchange...

you're wrong.

the key is to re-key so frequently there is never a significant volume
transferred under the same symmetric key.

in the manually keyed IPsec experiment i mentioned in another thread,
we used synchronized key daemons to maintain a rolling pair of
SA/AH+ESP associations that rotated on a per second interval.

as long as you didn't transfer more than some obtuse number of
terabits in a given second the assurance provided by a random key is
intact. (and we used VIA C5P dual RNG processors to provide the manual
keying material that was kept in sync between a pair of communicating
stations over unencrypted 802.11b - there was no IKE or other public
key exchange, just synchronized symmetric ciphers and digests)

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org";>leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5

Attachment: signature.asc
Description: Digital signature

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to