[Apologies for quoting badly] No! A thousand times no.
(1) the file isn't secret (2) the file isn't random. I'm sorry to pick on you, but you've illustrated a point I tried to make earlier. The OTP is a simple idea that is remarkably easy for people to misunderstand. Sent from my iPhone > On Mar 21, 2015, at 3:13 PM, Lee <[email protected]> wrote: > >> On 3/20/15, Michael Kjörling <[email protected]> wrote: >> On 20 Mar 2015 15:11 -0400, from [email protected] (Kevin): >>> I was tempted by the promise of software to run a one-time pad on my >>> machine. I am a fool and I fall upon my own sword. >> >> An unauthenticated one-time pad is trivial to implement; it's >> literally a few lines of code in any reasonably modern language, and a >> handful of lines of code in less modern ones. >> >> The hard part, as has been pointed out in this thread, is to generate >> and handle the _pad_. > > Would a commonly available large binary file make a good one-time pad? > Something like ubuntu-14.10-desktop-amd64.iso12 maybe.. > > Regards, > Lee > _______________________________________________ > cryptography mailing list > [email protected] > http://lists.randombit.net/mailman/listinfo/cryptography
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
