From: Bruce Stephens on
WTShaw <lurens1(a)gmail.com> writes:

> On Mar 24, 4:01 pm, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk>
> wrote:
>> Mark Murray <w.h.o...(a)example.com> writes:
>> > On 24/03/2010 08:01, adacrypt wrote:
>> >> characters numbered 32 to 126 inclusive =>  95 characters
>>
>> > Why?
>>
>> Apart from anything else it means you're leaking paragraph lengths (and
>> likely line-lengths, presuming one uses lines).  That's the kind of
>> thing that you definitely shouldn't be doing.
>>
>> [...]
>
> Given that information, which could be wrong on purpose, solving it
> might be a dare to try to illustrate the strength of a system.

It's an obvious weakness that wouldn't be present in a straightforward
OTP implementation: it's one that has been *added*.

Of course you could try to hide newlines. You might just not use any
(and not use paragraphs). Or use base64, for that matter.

But why bother? Why not just do it sanely? (As described on p.16 of
Applied Cryptography, for example---why didn't adacrypt just turn the
page?)
From: David Eather on
On 25/03/2010 4:01 PM, WTShaw wrote:
> On Mar 24, 4:01 pm, Bruce Stephens<bruce+use...(a)cenderis.demon.co.uk>
> wrote:
>> Mark Murray<w.h.o...(a)example.com> writes:
>>> On 24/03/2010 08:01, adacrypt wrote:
>>>> characters numbered 32 to 126 inclusive => 95 characters
>>
>>> Why?
>>
>> Apart from anything else it means you're leaking paragraph lengths (and
>> likely line-lengths, presuming one uses lines). That's the kind of
>> thing that you definitely shouldn't be doing.
>>
>> [...]
>
> Given that information, which could be wrong on purpose, solving it
> might be a dare to try to illustrate the strength of a system.

You know what those federal agencies think of that type of "dare" - it's
just fuel to fire up "old sparkie"
From: Mark Murray on
On 25/03/2010 08:08, Boon wrote:
> What is it about sci(ENTIFIC).crypt(OLOGY) that draws so many
> kooks, cranks, and non-understanders?

Nothing specific. There are cranks in every discipline. And not
only that, sports, crafts, arts etc. There is no limit to the
spaces available where an individual may overestimate him[*]self
for the amusement of others.

I have first-hand experience of physics cranks when working in
my first "real" job in a university physics dept.

I've been scared witless by a skydiving crank (I have 400 jumps
myself).

My mum (very "arty", and an retired teacher) has seen the lunacy
of Picasso-wannabes.

Ain't nothing special about sci.crypt. Its just an easy target.

M
--
Mark "No Nickname" Murray
Notable nebbish, extreme generalist.

[*] I have no memory of a female crank, but then I have a
non-exhaustive sample and a lousy memory.
From: WTShaw on
On Mar 25, 3:00 pm, Mark Murray <w.h.o...(a)example.com> wrote:

>
> I've been scared witless by a skydiving crank (I have 400 jumps
> myself).
>

Wantabe test pilot?
From: WTShaw on
On Mar 25, 4:15 am, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk>
wrote:
> WTShaw <lure...(a)gmail.com> writes:
> > On Mar 24, 4:01 pm, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk>
> > wrote:
>
>
> > Given that information, which could be wrong on purpose, solving it
> > might be a dare to try to illustrate the strength of a system.
>
> It's an obvious weakness that wouldn't be present in a straightforward
> OTP implementation: it's one that has been *added*.
>
Obvious and oblivious are not the same.