[149062] in cryptography@c2.net mail archive
Re: [Cryptography] [cryptography] Boing Boing pushing an RSA
daemon@ATHENA.MIT.EDU (Kent Borg)
Wed Jan 15 11:33:29 2014
X-Original-To: cryptography@metzdowd.com
Date: Wed, 15 Jan 2014 11:28:47 -0500
From: Kent Borg <kentborg@borg.org>
To: Steve Furlong <demonfighter@gmail.com>
In-Reply-To: <CAOFDsm1aSqVOWkT7uLyCjHENFcCADvXSNAoQzNuQOHeGAb02HA@mail.gmail.com>
Cc: John Young <jya@pipeline.com>, Cryptography <cryptography@metzdowd.com>,
	cryptography@randombit.net
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
This is a multi-part message in MIME format.
--===============4328222545384608668==
Content-Type: multipart/alternative;
 boundary="------------080003030201050509040709"
This is a multi-part message in MIME format.
--------------080003030201050509040709
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
On 01/15/2014 10:38 AM, Steve Furlong wrote:
> On Wed, Jan 15, 2014 at 9:15 AM, Kent Borg <kentborg@borg.org 
> <mailto:kentborg@borg.org>> wrote:
> > OTP has always ranged from difficult to impractical to securely 
> deploy, and
> > the larger system where OTP is used will offer targets for attack, but
> > one-time-pads themselves are compromised??
> Compromised PRNGs.
Which is completely different.
-kb, the Kent who doesn't want to see people crying that, say, AES-256 
has been compromised either--not unless it has.
--------------080003030201050509040709
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 01/15/2014 10:38 AM, Steve Furlong
      wrote:<br>
    </div>
    <blockquote
cite="mid:CAOFDsm1aSqVOWkT7uLyCjHENFcCADvXSNAoQzNuQOHeGAb02HA@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div class="gmail_extra">
          <div class="gmail_quote">On Wed, Jan 15, 2014 at 9:15 AM, Kent
            Borg <span dir="ltr"><<a moz-do-not-send="true"
                href="mailto:kentborg@borg.org" target="_blank">kentborg@borg.org</a>></span>
            wrote:</div>
          <div class="gmail_quote">> OTP has always ranged from
            difficult to impractical to securely deploy, and</div>
          <div class="gmail_quote">> the larger system where OTP is
            used will offer targets for attack, but</div>
          <div class="gmail_quote">> one-time-pads themselves are
            compromised??</div>
          <div class="gmail_quote"> </div>
          <div class="gmail_quote">Compromised PRNGs.</div>
        </div>
      </div>
    </blockquote>
    <br>
    Which is completely different.<br>
    <br>
    -kb, the Kent who doesn't want to see people crying that, say,
    AES-256 has been compromised either--not unless it has.<br>
  </body>
</html>
--------------080003030201050509040709--
--===============4328222545384608668==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============4328222545384608668==--