[19781] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: thoughts on one time pads

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Sat Jan 28 12:37:34 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: cryptography@metzdowd.com
In-Reply-To: (Your message of "Sat, 28 Jan 2006 20:24:49 +1300.")
             <E1F2kS1-0001xC-00@medusa01.cs.auckland.ac.nz> 
Date: Sat, 28 Jan 2006 12:20:53 -0500

How high-assurance are these CD destruction methods?  I don't recall 
seeing any articles on CD data recovery under normal conditions, let 
alone these.  As always, it depends on your threat model.  (Aside: to 
me, the only reason for using one-time pads is because you don't trust 
conventional encryption algorithms.  Given that AES is rated for top 
secret traffic by NSA, I will assert that any enemy who has a chance of 
attacking it can devote considerable resources to data recovery from 
smashed CDs.)

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post