Welcome to European Tribune. It's gone a bit quiet around here these days, but it's still going.
Display:
Computer speed isn't really an issue with one-time pads. The output is effectively random, if I recall properly (checks, yes I do), so there simply isn't the information there to break the code without the key, even in theory. You're not relying of the difficulty of computing anything.

At no point did I discuss the use of algorithmic random number generators: I may have neglected to specify, but's thats only because of the well-known idiocy of using one in connection with encryption.

I'm only discussing securing electronic communications: the rest of the trade craft is left as an exercise for the reader.

Given a one-time pad, using it to encrypt a message isn't the most difficult thing imaginable. It's the sort of thing you should be able to build to a very high level of assurance in a relatively short time. Be careful about what you write onto your transfer medium and you're pretty safe.

by Colman (colman at eurotrib.com) on Tue Aug 20th, 2013 at 10:33:25 AM EST
[ Parent ]
Long reply replaced by "fallible humans."
by asdf on Tue Aug 20th, 2013 at 11:43:02 AM EST
[ Parent ]
Sure. The risk of exposure rises exponentially (or thereabouts?)  in the number of people involved.
by Colman (colman at eurotrib.com) on Tue Aug 20th, 2013 at 12:07:00 PM EST
[ Parent ]
But that's sort of the point: if you want secure communications you have to go those sort of lengths and they're bloody impractical for anything other than point-to-point within a very small group of people or a very professional organisation.

Otherwise assume the NSA and friends are listening to everything.

by Colman (colman at eurotrib.com) on Tue Aug 20th, 2013 at 12:14:46 PM EST
[ Parent ]
Right, and with the smallest number of participants, two, you have to hope and pray that the other guy is not going to turn you in.
by asdf on Tue Aug 20th, 2013 at 12:18:45 PM EST
[ Parent ]

Display:

Occasional Series