----- Forwarded message from coderman <coder...@gmail.com> ----- Date: Wed, 25 Sep 2013 23:38:58 -0700 From: coderman <coder...@gmail.com> To: brian carroll <electromagnet...@gmail.com> Cc: cpunks <cypherpu...@cpunks.org> Subject: Re: The Unbreakable Cipher (2)
On Wed, Sep 25, 2013 at 9:29 PM, brian carroll <electromagnet...@gmail.com> wrote: > ... > no- not for a multilinear/nonlinear bit set approach. voluminous data > exchange... you're wrong. the key is to re-key so frequently there is never a significant volume transferred under the same symmetric key. in the manually keyed IPsec experiment i mentioned in another thread, we used synchronized key daemons to maintain a rolling pair of SA/AH+ESP associations that rotated on a per second interval. as long as you didn't transfer more than some obtuse number of terabits in a given second the assurance provided by a random key is intact. (and we used VIA C5P dual RNG processors to provide the manual keying material that was kept in sync between a pair of communicating stations over unencrypted 802.11b - there was no IKE or other public key exchange, just synchronized symmetric ciphers and digests) ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
signature.asc
Description: Digital signature
_______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography