IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Two things.
1. Use OTP once! Otherwise, it's NOT a one time pad.

2. OTP relies on having a truly random number as long the data you want to protect.

That brings me to the following quote:
“The generation of random numbers is too important to be left to chance.”—Robert R. Coveyou

There have been "pseudo-random number generators" that were very insecure.
Alex

"There is a cult of ignorance in the United States, and there has always been. The strain of anti-intellectualism has been a constant thread winding its way through our political and cultural life, nurtured by the false notion that democracy means that "my ignorance is just as good as your knowledge."

-- Isaac Asimov
New Or in related puzzlements,
The generation of sane, viable societies is too important to be left to ordinary humans.

But I don't know where that Leaves us, in any next.. :-/
New It is mainly a key transport problem
Any electronic transport method is vulnerable in one way or another. The security of the OTP is reduced to the level of the method used to transport the key. That is why there still is no viable electronic OTP. Even the method I posted earlier still requires a secure physical meeting between each pair of messengers.
     geriactic brain needs some input regards encryption - (boxley) - (20)
         First step in writing your own encryption algorithm ... - (drook) - (2)
             And this... :-) -NT - (scoenye)
             In other words: - (static)
         It is different - (scoenye) - (9)
             Ah, a usefull reply - (boxley) - (8)
                 Hey, mine was useful! - (drook) - (1)
                     Me too. :-) -NT - (Another Scott)
                 Something like this? - (scoenye) - (2)
                     Love. It. Best hopeful-Aha! in a long time :-) - (Ashton)
                     enough like it to require a licence :-( -NT - (boxley)
                 What's wrong with cipher block chaining? -NT - (static) - (2)
                     As used in SSLv3/TLS1.0 - (scoenye) - (1)
                         Ah. Understood. -NT - (static)
         A more generic tool... - (Another Scott) - (6)
             good link, thanks - (boxley) - (5)
                 There is only one unbreakable cypher - (pwhysall) - (4)
                     my idea is to create an EOTP -NT - (boxley) - (3)
                         Two things. - (a6l6e6x) - (2)
                             Or in related puzzlements, - (Ashton)
                             It is mainly a key transport problem - (scoenye)

*gloat*
109 ms