[cryptography] Unbreakable crypto?

Jeffrey Goldberg jeffrey at goldmark.org
Sat Mar 21 16:51:53 EDT 2015

[Apologies for quoting badly]

No!  A thousand times no. 

(1) the file isn't secret
(2) the file isn't random. 

I'm sorry to pick on you, but you've illustrated a point I tried to make earlier. The OTP is a simple idea that is remarkably easy for people to misunderstand. 

Sent from my iPhone

> On Mar 21, 2015, at 3:13 PM, Lee <ler762 at gmail.com> wrote:
>> On 3/20/15, Michael Kjörling <michael at kjorling.se> wrote:
>> On 20 Mar 2015 15:11 -0400, from kevinsisco61784 at gmail.com (Kevin):
>>> I was tempted by the promise of software to run a one-time pad on my
>>> machine.  I am a fool and I fall upon my own sword.
>> An unauthenticated one-time pad is trivial to implement; it's
>> literally a few lines of code in any reasonably modern language, and a
>> handful of lines of code in less modern ones.
>> The hard part, as has been pointed out in this thread, is to generate
>> and handle the _pad_.
> Would a commonly available large binary file make a good one-time pad?
> Something like ubuntu-14.10-desktop-amd64.iso12 maybe..
> Regards,
> Lee
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2021 bytes
Desc: not available
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20150321/d9631c6f/attachment.p7s>

More information about the cryptography mailing list