[8609] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Making One-time pad using the soundcard

daemon@ATHENA.MIT.EDU (Paul N)
Sat Feb 17 15:05:00 2001

Message-Id: <200102141331.PAA00833@zerg.codec.ro>
From: Paul N <paul_ft2@email.ro>
To: cryptography@c2.net
Date: Wed, 14 Feb 2001 15:31:01 +0200
MIME-Version: 1.0


It is secure to make a onetime pad using 16 bit input from soundcard using the 
following algorithm?

Each bit of the output is the result of XOR-ing all 16 bits from the input 
sample... so, for making one byte of "one-time pad", I need 8 samples (16*8 
bits or 16 bytes) of input?

Of course I allow this only if the cllipping doesn't occurs and there is 
nosilence....

[I would not feel particularly comfortable merely combining the bits
of a single sample -- distilling entropy using a hash function and
large blocks of input would probably work out better. I'm sure there
will be plenty of opinions around here. --Perry]

home help back first fref pref prev next nref lref last post