How many suitable quasars are there? You'd be damn lucky if its a
cryptograhic strength number.
Now you might think there are limits to how many signals you can
listen to and that would be some protection, however you still have
brute force guess a signal, and probability of guessing the right
On Wed, 29 Mar 2006, Sean McGrath wrote:
He adds that the method does not require a large radio antenna or
that the communicating parties be located in the same hemisphere, as
radio signals can be broadcast over the internet at high speed.
It sounds like encrypting $P$ by xoring it with random
Internet webcam signals from webcams could emerge as an
exotic but effective new tool for securing terrestrial
communications against eavesdropping.
Scientists have come up with a method for encrypting
messages using the internet objects, which emit signals
and are thought to be powered by DC
I (Hal Finney) wrote:
A couple of (rather uninformed) thoughts regarding HMAC-MD5: First,
how could collision attacks be extended to preimage attacks? And second,
how would preimage attacks affect HMAC-MD5?
I have to apologize for that message; I was totally confused particularly
in the
I think that we have the evidence. The security MD5 depends
heavily on a lot of nonlinearities in functions F,G,I and on
carries in arithmetic additions. Nonlinearities in F,G,I are
bitwise and very weak. Carries are much stronger, but the collision
attacks showed that it is possible to controll
Heyman, Michael wrote:
Internet webcam signals from webcams could emerge as an
exotic but effective new tool for securing terrestrial
communications against eavesdropping.
snip
Kidding aside, there are some interesting theoretical results about
ciphers that utilize a plentiful, publicly