From: Mok-Kong Shen on
rossum wrote:
> Richard Outerbridge wrote:
>
>> Now, obviously, 1320000 bits is nowhere close to infinity,
>> but it's easily conveyed, transported and pre-established.
>>
>> If SuperKISS is all Marsaglia claims it to be, why couldn't
>> it form the basis of a practical, unbreakable, one-time-pad
>> system?
> It could possibly be the basis of a perfectly good practical stream
> cypher. It could never be a One Time Pad. If there is no TRNG
> involved then there is no OTP either. KISS may well be a very good
> PRNG but it is not a TRNG.

I use to think that one should (in practice) be content with
(reasonably) sufficiently high practical security. For the theoretical
perfect security of OTP is by its nature never (in the absolute sense)
practically achievable for diverse practical reasons. (One well-known
practical attempt to use OTP that badly failed was Vernona.)

M. K. Shen

From: unruh on
On 2010-01-04, Richard Outerbridge <outer(a)interlog.com> wrote:
> In article <5b24k5970vopcd86071vb2vga461qeahso(a)4ax.com>,
> rossum <rossum48(a)coldmail.com> wrote:
>
>> On Mon, 04 Jan 2010 02:25:13 +0100, Ohm <Ohm(a)no.no> wrote:
>> This is not a One Time Pad, so to that extent it is snake oil. It may
>> or may not be a secure cypher, but I would not be inclined to risk
>> using it without a lot of further study. Safer to use one of the more
>> established cyphers.
>
> What if one were to take Marsglia's recent Super_KISS generator?
>
> The internal states seem to me to be:
>
> superKISS32 internal state
>
> Q[] 41265 * 32 = 1320480
> carry 1 * 32 = 32
> xcng 1 * 32 = 32
> xs 1 * 32 = 32
> indx 1 * 15.33 = 15
>
> More-or-less ~1320591 bits
>
> superKISS64 internal state
>
> Q[] 20632 * 64 = 1320448
> carry 1 * 64 = 64
> xcng 1 * 64 = 64
> xs 1 * 64 = 64
> indx 1 * 14.33 = 14
>
> More-or-less ~1320654 bits
>
> Now, obviously, 1320000 bits is nowhere close to infinity,
> but it's easily conveyed, transported and pre-established.
>
> If SuperKISS is all Marsaglia claims it to be, why couldn't
> it form the basis of a practical, unbreakable, one-time-pad
> system?

Why couldn't a horse be a jet fighter? There is a definition of a one
time pad, and it is what is provably unbreakable. What you describe is
NOT unbreakable in theory. It may be hard to break and may be a good
practical cypher, but it is not a one time pad and is not unbreakable.


>
> The usual caveats apply.
>
> outer
>
From: unruh on
On 2010-01-04, Mok-Kong Shen <mok-kong.shen(a)t-online.de> wrote:
> rossum wrote:
>> Richard Outerbridge wrote:
>>
>>> Now, obviously, 1320000 bits is nowhere close to infinity,
>>> but it's easily conveyed, transported and pre-established.
>>>
>>> If SuperKISS is all Marsaglia claims it to be, why couldn't
>>> it form the basis of a practical, unbreakable, one-time-pad
>>> system?
>> It could possibly be the basis of a perfectly good practical stream
>> cypher. It could never be a One Time Pad. If there is no TRNG
>> involved then there is no OTP either. KISS may well be a very good
>> PRNG but it is not a TRNG.
>
> I use to think that one should (in practice) be content with
> (reasonably) sufficiently high practical security. For the theoretical

That may be true, but is also irrelevant. There is a definiton of a one
time pad and it is a cypher which obeys that definition which is
theoretically unbreakable. Many people want to pretend to hide under
that umbrella, and make unwarranted and extravagant claims for their own
cypher. As soon as they do so, one knows they are incompetent, and
should not be trusted to hide the Easter eggs, never mind something more
serious.

> perfect security of OTP is by its nature never (in the absolute sense)
> practically achievable for diverse practical reasons. (One well-known
> practical attempt to use OTP that badly failed was Vernona.)

That may be. So why try to claim that you have achieved it, except to
commit fraud.

>
> M. K. Shen
>
From: Jens Stuckelberger on
On Mon, 04 Jan 2010 19:28:25 +0100, Mok-Kong Shen wrote:

> (One well-known practical attempt to use OTP that badly failed was
> Vernona.)

That depends on your definition of "badly failed." Between '42
and '48 just a few thousands, out of hundreds of thousands, of
intercepted Soviet messages were decrypted - most of them only partially
so. After '48, zilch. The Soviets might claim that this just not was 100%
successful - not quite the same as "badly failed."


From: rossum on
On Mon, 04 Jan 2010 19:28:25 +0100, Mok-Kong Shen
<mok-kong.shen(a)t-online.de> wrote:

>One well-known practical attempt to use OTP that badly failed was Vernona.
That was Venona. It failed because they reused some of the random
key. Reusing some key breaks the OTP proof. An XOR cypher with a
repeated key is very weak.

rossum

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12
Prev: Certificates
Next: Q: Kerchhoffs' principle