Hello,

a similar technique has been discussed here:
http://www.schneier.com/blog/archives/2007/06/perpetual_dogho.html

("The key is not transferred but is instead created from a file of any
size that is available on both a computer used to send a secure
message and a computer used to receive a secure message.")

Regards,
Thomas Pollet

On 05/07/07, Dan Becker <[EMAIL PROTECTED]> wrote:
>
> I have an idea that won't leave me alone and this list seems to have
> the most potential for knowing if the idea exists. My apologies for a
> somewhat offtopic post.
>
> Would there be a way to create a  rainbow table of tcp packets to be
> used to generate one packet for every 1000 or so normal packets simply
> by matching hashes with databases on both ends ?
>
> One could use this for crypto or simply traffic reduction over latent
> networks such as satellites.
>
> ------------------------------------------------------------------------
>
>       All message scanned for viruses with Clam Antivirus.
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to