[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
new idea for random number generation
- Subject: new idea for random number generation
- From: dreamingforward at gmail.com (\0xDynamite)
- Date: Tue, 26 Sep 2017 15:14:33 +0000
- In-reply-to: <[email protected]>
- References: <CAMjeLr_MUhL-Q89DJHx6UrBjsHjzWd2QGXYjKatYXbj=Aw3Z-A@mail.gmail.com> <[email protected]> <CAMjeLr8mUFbabJsjuRAnesxQZ-0_hYtsLXK4UnW+kOQWRm0YTw@mail.gmail.com> <[email protected]> <CAMjeLr_pMmxennCo5Dy3VLJFD9VLN=p544hv7OWkik78XTsORg@mail.gmail.com> <[email protected]> <CAMjeLr9maCDSwnBK-wfXG=ZPhQhdovLjmwa6d2TFDHspktW-hw@mail.gmail.com> <[email protected]>
>>AFAICT, it is UNBREAKABLE if the keysize is at least half the size of
> your plaintext.
>
> My understanding is that the keysize ought to be as long as the message to
> be encrypted.
Well if they don't know the key length, then using somewhere between
1/3 and 2/3 should make it unbreakable.
> And yes, it is unbreakable... UNLESS you try to reuse the keys!!!
Hmm, but THEY don't know if you re-used them. So it would take how
many ciphertexts messages to figure that out?
Marxos