[149077] in cryptography@c2.net mail archive
Re: [Cryptography] [cryptography] Boing Boing pushing an RSA
daemon@ATHENA.MIT.EDU (Bill Frantz)
Thu Jan 16 00:15:40 2014
X-Original-To: cryptography@metzdowd.com
Date: Wed, 15 Jan 2014 20:59:58 -0800
From: Bill Frantz <frantz@pwpconsult.com>
To: cryptography@metzdowd.com
In-Reply-To: <CAOFDsm1aSqVOWkT7uLyCjHENFcCADvXSNAoQzNuQOHeGAb02HA@mail.gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 1/15/14 at 7:38 AM, demonfighter@gmail.com (Steve Furlong) wrote:
>On Wed, Jan 15, 2014 at 9:15 AM, Kent Borg <kentborg@borg.org> wrote:
>
>>On 01/14/2014 07:48 PM, John Young wrote:
>>> Even precious OTP is compromised, the "gold standard" of
>>> industry pure-blooded progeny. No matter, cryptologists are
>>> dogged and faithful as rutting canines.
>
>>Huh?  How can this be?
>
>>OTP has always ranged from difficult to impractical to securely deploy,
>and
>>the larger system where OTP is used will offer targets for attack, but
>>one-time-pads themselves are compromised??
>
>Compromised PRNGs.
If the system uses a PRNG, it isn't a OTP. It is a stream cypher 
using the PRNG to generate the cypher stream.
Cheers - Bill
-----------------------------------------------------------------------
Bill Frantz        | Concurrency is hard. 12 out  | Periwinkle
(408)356-8506      | 10 programmers get it wrong. | 16345 
Englewood Ave
www.pwpconsult.com |                - Jeff Frantz | Los Gatos, 
CA 95032
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography