[149062] in cryptography@c2.net mail archive
Re: [Cryptography] [cryptography] Boing Boing pushing an RSA
daemon@ATHENA.MIT.EDU (Kent Borg)
Wed Jan 15 11:33:29 2014
X-Original-To: cryptography@metzdowd.com
Date: Wed, 15 Jan 2014 11:28:47 -0500
From: Kent Borg <kentborg@borg.org>
To: Steve Furlong <demonfighter@gmail.com>
In-Reply-To: <CAOFDsm1aSqVOWkT7uLyCjHENFcCADvXSNAoQzNuQOHeGAb02HA@mail.gmail.com>
Cc: John Young <jya@pipeline.com>, Cryptography <cryptography@metzdowd.com>,
cryptography@randombit.net
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
This is a multi-part message in MIME format.
--===============4328222545384608668==
Content-Type: multipart/alternative;
boundary="------------080003030201050509040709"
This is a multi-part message in MIME format.
--------------080003030201050509040709
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
On 01/15/2014 10:38 AM, Steve Furlong wrote:
> On Wed, Jan 15, 2014 at 9:15 AM, Kent Borg <kentborg@borg.org
> <mailto:kentborg@borg.org>> wrote:
> > OTP has always ranged from difficult to impractical to securely
> deploy, and
> > the larger system where OTP is used will offer targets for attack, but
> > one-time-pads themselves are compromised??
> Compromised PRNGs.
Which is completely different.
-kb, the Kent who doesn't want to see people crying that, say, AES-256
has been compromised either--not unless it has.
--------------080003030201050509040709
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="moz-cite-prefix">On 01/15/2014 10:38 AM, Steve Furlong
wrote:<br>
</div>
<blockquote
cite="mid:CAOFDsm1aSqVOWkT7uLyCjHENFcCADvXSNAoQzNuQOHeGAb02HA@mail.gmail.com"
type="cite">
<div dir="ltr">
<div class="gmail_extra">
<div class="gmail_quote">On Wed, Jan 15, 2014 at 9:15 AM, Kent
Borg <span dir="ltr"><<a moz-do-not-send="true"
href="mailto:kentborg@borg.org" target="_blank">kentborg@borg.org</a>></span>
wrote:</div>
<div class="gmail_quote">> OTP has always ranged from
difficult to impractical to securely deploy, and</div>
<div class="gmail_quote">> the larger system where OTP is
used will offer targets for attack, but</div>
<div class="gmail_quote">> one-time-pads themselves are
compromised??</div>
<div class="gmail_quote"> </div>
<div class="gmail_quote">Compromised PRNGs.</div>
</div>
</div>
</blockquote>
<br>
Which is completely different.<br>
<br>
-kb, the Kent who doesn't want to see people crying that, say,
AES-256 has been compromised either--not unless it has.<br>
</body>
</html>
--------------080003030201050509040709--
--===============4328222545384608668==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============4328222545384608668==--