From: unruh on
On 2010-01-30, rossum <rossum48(a)coldmail.com> wrote:
> On Sat, 30 Jan 2010 02:55:48 -0800 (PST), john <penetratorv(a)yahoo.com>
> wrote:
>
>>On Jan 30, 10:14??am, rossum <rossu...(a)coldmail.com> wrote:
>>> On Fri, 29 Jan 2010 21:43:34 -0800 (PST), john <penetrat...(a)yahoo.com>
>>> wrote:
>>>
>>> >If by design it requires 10000
>>> >SHA-256 in sequence to validate the password to ensure security, do
>>> >not use this as a measure.
>>>
>>> Your lack of cryptographic knowledge is showing. ??This technique is
>>> called "stretching" and is used to slow down brute force attacks.
>>>
>>> rossum
>>
>>- Whatever you call that dude, it won't bother me at all, you can copy-
>>paste all your cryptographical terms here, it's free. I rather don't
>>go off-topic or repeat things over and over again just to show to the
>>world that I'm an expert of SHA-0, SHA-1, 256, 384, 512 huh! You can
>>go over the past posts to see how a brute force attack is just not
>>enough to break the iotp.
>>
>>John Springfield
> Your ignorance of the purpose of cryptographic stretching is noted.
> Such ignorance only confirms that your advice on the quality of
> cryptographic software is worth precisely what we are paying for it.

I disagree. Someone might listen to him, in which case it is worth large
negative values.
>
> rossum
>
>
From: Richard Herring on
In message
<d295061d-8c58-477b-9696-9a13466a9762(a)22g2000yqr.googlegroups.com>, john
<penetratorv(a)yahoo.com> writes
>>
>> >The Plain Text changes in length after compression and transformation.
>>
>> Not relevant.
>>
>- Of course it's relevant dude, that denies the classic unicity
>distance theory.

Really? You think compressing the plaintext changes its entropy?

Care to give a worked example?

>>
>> >You will be attacking the
>> >Transformed Text not the Plain Text. Password, Modification, Secret
>> >Code
>> >could be any length.
>>
>> So it's not required to be as long as the plaintext?
>
>- Certainly dude, if it is then that's classic, if it isn't then
>that's IOTP.
>
Then by definition "IOTP" does not possess perfect secrecy.

Since the only compelling reason for using a true OTP is its provable
perfect secrecy, "IOTP" lacks the one property that would justify any
"OTP-like" claims, and clearly should be renamed "I" to avoid confusion.

--
Richard Herring
First  |  Prev  | 
Pages: 14 15 16 17 18 19 20 21 22 23 24
Prev: Certificates
Next: Q: Kerchhoffs' principle