View Single Post
Old 12-28-2016, 06:33 AM  
notinmybackyard
Confirmed User
 
notinmybackyard's Avatar
 
Industry Role:
Join Date: Sep 2012
Posts: 3,230
Quote:
Originally Posted by Smack dat View Post
Just spent about 30 mins reading up about one time pad. Interesting, thanks.
Anytime - I'm a walking book of "useless but interesting" information. LOL

Quote:
Originally Posted by rowan View Post
It's still possible to crack this if the source of "randomness" is weak or buggy.

https://security-tracker.debian.org/.../CVE-2008-0166

Due to a coding bug, the random number generator was seeded with only 15 bits of data, which means that only 32767 unique streams would be output by the random number generator. If a key is generated immediately after seeding, that means there's only 32767 possible keys, which makes brute forcing easy. Normally a random number generator suitable for cryptography would use many, many more bits as a seed.

So if the random number generator for your OTP is flawed, it may be possible to crack the message.
Everything is flawed when you screw up including encryption.

It's this reason that the One-Time-Pad tends to be still done by hand without the assistance of a computer. Real spies carry the "key" usually on an extremely small piece of paper that can be easily hidden. (ie: During the cold war Russian spies would do things like have it placed under a toe nail)

Having done some personal research on the subject I quickly learned that any group that's honestly serious (and worth worrying about) uses almost exclusively very low-tech methods to defeat state run intelligence groups.
__________________
officially retired as of March 01 2018 but still fucking around and getting into shit.
notinmybackyard is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote