Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

...subject to your key being safe, produced from a good source of entropy and never used anywhere else. Is this provable?


keeping the key safe, yes, using the key once, yes, but need not be random at all (with in reason - a key of 0s is feasible, under the pretense that the cipher text, which would be equal to the plain text, is the cipher text for any message with the same length, for some key)

the key space being the same size as the message space, and cipher text space means that all messages of equal length are possible, with no way of knowing which one is the correct one. i suppose, a theoretical attack would be to be to enumerate all messages in the english language, XOR them with the cipher text, and see which resulting keys come close the properties of the PRNG used..

even non-determinism can't help you here, i'm afraid.


I leave the reason that this is among the funnier HN crypto comments ever as an exercise to the reader. And, of course it happened on a Bitcoin thread.


never once tried to argue that it is a practical approach...

additionally, attempting to exhibit intellectual superiority by making someone look stupid, isn't infuriating, it's just sad.

i wouldn't conduct myself like that in public or on the internet. it's a shame that anyone thinks it's acceptable.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: