yes, should have thought it through ...
On Thu, Jun 13, 2013 at 4:44 PM, Natanael wrote:
> Isn't that equivalent to sender doing XOR on the plaintext, recipient
> doing XOR on first ciphertext, sender doing another XOR on second
> ciphertext to create third ciphertext, and the recipient doing X
Isn't that equivalent to sender doing XOR on the plaintext, recipient doing
XOR on first ciphertext, sender doing another XOR on second ciphertext to
create third ciphertext, and the recipient doing XOR again to get plaintext?
That's key-reuse and breaks XOR/OTP. The middleman simply XORs the
ciph
Koenig's idea is interesting, and with a small twist I think could have
worked. If instead of only applying noise at the receiving end, noise was
first applied by the sender, then the recipient applies his own noise and
sends it back to the sender, who then subtracts his original noise and
sends it