Secrets and lies and one time pads.

2003-01-04 Thread Matthew X
Welcome to the companion Web site to "Secrets, Lies, and Atomic Spies," originally broadcast on February 5, 2002. The program chronicles the lives and covert activities of the so-called "atom spies" in the 1940's, including the big one that got away, Theodore Alvin Hall. Here's what you'll find

Re: One time pads

2002-10-19 Thread Morlock Elloi
> Also, can your tool use floppies instead of USB keys? It's a freakin' C program that works on a file - but carrying a floppy around is so ... ordinary. > There are problems with KGB-quality attackers recovering overwritten data > which are probably much more serious for disks than flash rom, >

Re: One time pads

2002-10-18 Thread Bill Stewart
At 10:52 PM 10/17/2002 -0700, Morlock Elloi wrote: > >I have a working OTP system on $40 64 Mb USB flash disk on my keychain. > > Cute. Is it available? $39 + tax in Fry's. I don't mean the disk - there are lots of those. I mean your software. Also, can your tool use floppies instead of USB ke

Re: One time pads

2002-10-18 Thread Bill Stewart
At 02:04 PM 10/17/2002 +0200, Eugen Leitl wrote: It is important to note that currently NMR bases systems only allow for 6 qubits. Only very recently we're getting practical qubits in solid state. . Everybody realizes that we're discussing currently completely theoretical vulnerabilities, righ

Re: One time pads

2002-10-17 Thread Bill Stewart
At 12:16 PM 10/17/2002 -0700, Morlock Elloi wrote: I have a working OTP system on $40 64 Mb USB flash disk on my keychain. Cute. Is it available? How do you prevent other applications from reading the file off your USB disk, either while your application is using it or some other time? That's

Re: One time pads

2002-10-17 Thread Sam Ritchie
gt; Date: Thu, 17 Oct 2002 13:45:01 +0100 > To: "Email List: Cypherpunks" <[EMAIL PROTECTED]> > Subject: Re: One time pads > > at Thursday, October 17, 2002 2:20 AM, Sam Ritchie > <[EMAIL PROTECTED]> was seen to say: >> ACTUALLY, quantum computing does

Re: One time pads

2002-10-17 Thread Morlock Elloi
> Pretty much, yes. at least one "real world" OTP system assumes you will > be using three CDRW disks; the three are xored (as you say) together, I have a working OTP system on $40 64 Mb USB flash disk on my keychain. The disk mounts on windoze and macs, and also contains all s/w required to enc

Re: One time pads

2002-10-17 Thread Bill Stewart
At 09:20 PM 10/16/2002 -0400, Sam Ritchie wrote: > ACTUALLY, quantum computing does more than just halve the effective key >length. With classical computing, the resources required to attack a given >key grow exponentially with key length. (a 128-bit key has 2^128 >possibilities, 129 has 2^129

Re: One time pads and Quantum Computers

2002-10-16 Thread David E. Weekly
> > David E. Weekly[SMTP:[EMAIL PROTECTED]] > > > Which means that you should start thinking about > > > using OTP *now* if you have secrets you'd like to keep past when an > > > adversary of yours might have access to a quantum computer. ... > > OTPs won't help a bit for that problem. > They're

Re: One time pads

2002-10-16 Thread Sam Ritchie
AIL PROTECTED]>, "Email List: Cypherpunks" > <[EMAIL PROTECTED]>, "'David E. Weekly'" <[EMAIL PROTECTED]> > Subject: RE: One time pads > >> David E. Weekly[SMTP:[EMAIL PROTECTED]] >> >> Naive question here, but what if you made mul

RE: One time pads and Quantum Computers

2002-10-16 Thread Bill Stewart
> > David E. Weekly[SMTP:[EMAIL PROTECTED]] > > As for PKI being secure for 20,000 years, it sure as hell won't be if > > those million-qubit prototypes turn out to be worth their salt. > > Think more like 5-10 years. In fact, just about everything except > > for OTP solutions will be totally, tot

RE: One time pads

2002-10-16 Thread Trei, Peter
> David E. Weekly[SMTP:[EMAIL PROTECTED]] > > Naive question here, but what if you made multiple one time pads (XORing > them all together to get your "true key") and then sent the different pads > via different mechanisms (one via FedEx, one via secure courier, o

Re: One time pads

2002-10-16 Thread David E. Weekly
Naive question here, but what if you made multiple one time pads (XORing them all together to get your "true key") and then sent the different pads via different mechanisms (one via FedEx, one via secure courier, one via your best friend)? Unless *all* were compromised, the combined

One time pads

2002-10-16 Thread Sarad AV
hi, An extract frm this months cryptogram goes as below. On the other hand, if you ever find a product that actually uses a one-time pad, it is almost certainly unusable and/or insecure. So, let me summarize. One-time pads are useless for