Thank you Kevin for your comments!

One-time pad offers perfect secrecy, but yes, it is not much used in
practice mainly because of several problems/challenges I am sure you
in this list are well aware of.

About the XEP proposal: if Prover and Verifier clients are running in
same device or even in same application, amount of one-time pad
related problems decreases, because the keys can be used, transmitted,
stored and deleted, e.g., inside one running program. Randomness that
is good enough for cryptography is of course problematic. Usage of
one-time pad would be very different than we have learned from crypto
books. A new key and message to be encrypted could be randomly
generated every time when authenticating. No long pads are
used/needed/stored so it has still been quite fast in my tests.

But would one-time pad actually give any additional security when
compared just using a random string (key part from one-time pad
without the encrypted message)?

Can anyone find threats related to the XEP proposal? Like from message
authentication? For example, one-time pads do not provide any message
authentication, would it be more secure to to use random key to
encrypt a randomly generated message or understandable message? Is
there any difference?

At the moment message authentication is provided using a mechanism
where the Verifier processes only a message coming from a known Prover
containing a known secret. If there is errors in the sender or in the
secret, the message is not processed as authentic. In addition XMPP's
E2E security could be used for encryption/authenticity.

-Teemu

2014/1/10 Kevin <kevinsisco61...@gmail.com>:
> I have looked over the 2-factoring mechanism and I feel the need to point
> something out:
> The one-time pad, while great in theory, proves somewhat unrealistic in
> practice.  It can be slow, especially if used in hardware.  So if used in a
> router could possibly lag the network.  Again, the one-time pad is great in
> theory; I personally like it. Realistically, however, I'd replace it with
> something else.  Just my thoughts.
>
> --
> Kevin
>
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to