At 10:52 PM 10/17/2002 -0700, Morlock Elloi wrote:
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
Cute. Is it available?
$39 + tax in Fry's.
I don't mean the disk - there are lots of those.
I mean your software.
Also, can your tool use floppies instead of USB keys?
At 02:04 PM 10/17/2002 +0200, Eugen Leitl wrote:
It is important to note that currently NMR bases systems only allow for
6 qubits. Only very recently we're getting practical qubits in solid state.
.
Everybody realizes that we're discussing currently completely theoretical
vulnerabilities,
At 12:16 PM 10/17/2002 -0700, Morlock Elloi wrote:
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
Cute. Is it available?
How do you prevent other applications from reading the file off your
USB disk, either while your application is using it or some other time?
That's
at Wednesday, October 16, 2002 6:13 PM, Bill Frantz
[EMAIL PROTECTED] was seen to say:
OTP is also good when:
(1) You can solve the key distribution problem.
Its certainly usable provided key distribution isn't an issue - if it is
also worth the trouble and expense is another matter.
(2) You
at Wednesday, October 16, 2002 7:17 PM, David E. Weekly
[EMAIL PROTECTED] was seen to say:
As for PKI being secure for 20,000 years, it sure as hell won't be if
those million-qubit prototypes turn out to be worth their salt.
I wasn't aware they even had a dozen-qbit prototypes functional yet -
Pretty much, yes. at least one real world OTP system assumes you will
be using three CDRW disks; the three are xored (as you say) together,
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
The disk mounts on windoze and macs, and also contains all s/w required to
At 09:20 PM 10/16/2002 -0400, Sam Ritchie wrote:
ACTUALLY, quantum computing does more than just halve the effective key
length. With classical computing, the resources required to attack a given
key grow exponentially with key length. (a 128-bit key has 2^128
possibilities, 129 has 2^129,
David E. Weekly[SMTP:[EMAIL PROTECTED]]
Naive question here, but what if you made multiple one time pads (XORing
them all together to get your true key) and then sent the different pads
via different mechanisms (one via FedEx, one via secure courier, one via
your best friend)? Unless *all
At 7:52 AM -0700 10/16/02, David Howe wrote:
OTP is the best choice for something that must be secret for all time,
no matter what the expense.
anything that secure for 20,000 years will be sufficient for, go for
PKI instead :)
OTP is also good when:
(1) You can solve the key distribution
, they may not have time to
exchange tapes securely; unless there is a airplane link directly or
indirectly between the sites, it may be days or weeks in transit.
can some one answer the issues involved that one time
pads is not a good choice.
OTP is the best choice for something that must be secret
Naive question here, but what if you made multiple one time pads (XORing
them all together to get your true key) and then sent the different pads
via different mechanisms (one via FedEx, one via secure courier, one via
your best friend)? Unless *all* were compromised, the combined key would
still
hi,
An extract frm this months cryptogram goes as below.
On the other hand, if you ever find a product that
actually uses a one-time pad, it is almost certainly
unusable and/or insecure.
So, let me summarize. One-time pads are useless
David E. Weekly[SMTP:[EMAIL PROTECTED]]
As for PKI being secure for 20,000 years, it sure as hell won't be if
those million-qubit prototypes turn out to be worth their salt.
Think more like 5-10 years. In fact, just about everything except
for OTP solutions will be totally, totally
David E. Weekly[SMTP:[EMAIL PROTECTED]]
Which means that you should start thinking about
using OTP *now* if you have secrets you'd like to keep past when an
adversary of yours might have access to a quantum computer. ...
OTPs won't help a bit for that problem.
They're fine for
[EMAIL PROTECTED], 'David E. Weekly' [EMAIL PROTECTED]
Subject: RE: One time pads
David E. Weekly[SMTP:[EMAIL PROTECTED]]
Naive question here, but what if you made multiple one time pads (XORing
them all together to get your true key) and then sent the different pads
via different mechanisms
15 matches
Mail list logo