[8609] in cryptography@c2.net mail archive
Making One-time pad using the soundcard
daemon@ATHENA.MIT.EDU (Paul N)
Sat Feb 17 15:05:00 2001
Message-Id: <200102141331.PAA00833@zerg.codec.ro>
From: Paul N <paul_ft2@email.ro>
To: cryptography@c2.net
Date: Wed, 14 Feb 2001 15:31:01 +0200
MIME-Version: 1.0
It is secure to make a onetime pad using 16 bit input from soundcard using the
following algorithm?
Each bit of the output is the result of XOR-ing all 16 bits from the input
sample... so, for making one byte of "one-time pad", I need 8 samples (16*8
bits or 16 bytes) of input?
Of course I allow this only if the cllipping doesn't occurs and there is
nosilence....
[I would not feel particularly comfortable merely combining the bits
of a single sample -- distilling entropy using a hash function and
large blocks of input would probably work out better. I'm sure there
will be plenty of opinions around here. --Perry]