Reusing random segments, 2xencryption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Re-using the random segments could create vulnerability because there is repetiton. One Time Pad (OTP) is a simple, unbreakable scheme, but if you re-use the pads, it is easy to break. I think that concept relates well to the issue of reusing a smaller random segment. If you aren't familiar with OTP, it may be worthwhile to look up, because it is simple. I don't know how to quantify the increase in vulnerability of using smaller segments.

The block ciphers already make multiple passes over the data. Encrypting twice will cause you to use 2 passwords and so double the entropy in your key, but will still be vulnerable to an attack by pre-generated dictionary for known plain text. --if I understand what you mean by encrypting twice.

I was expecting this idea to be provocative and generate more response. Are there other forums you would recommend for posting this proposal?

Attachment: signature.asc
Description: OpenPGP digital signature


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux