[Apologies for quoting badly]

No!  A thousand times no. 

(1) the file isn't secret
(2) the file isn't random. 

I'm sorry to pick on you, but you've illustrated a point I tried to make 
earlier. The OTP is a simple idea that is remarkably easy for people to 
misunderstand. 



Sent from my iPhone

> On Mar 21, 2015, at 3:13 PM, Lee <[email protected]> wrote:
> 
>> On 3/20/15, Michael Kjörling <[email protected]> wrote:
>> On 20 Mar 2015 15:11 -0400, from [email protected] (Kevin):
>>> I was tempted by the promise of software to run a one-time pad on my
>>> machine.  I am a fool and I fall upon my own sword.
>> 
>> An unauthenticated one-time pad is trivial to implement; it's
>> literally a few lines of code in any reasonably modern language, and a
>> handful of lines of code in less modern ones.
>> 
>> The hard part, as has been pointed out in this thread, is to generate
>> and handle the _pad_.
> 
> Would a commonly available large binary file make a good one-time pad?
> Something like ubuntu-14.10-desktop-amd64.iso12 maybe..
> 
> Regards,
> Lee
> _______________________________________________
> cryptography mailing list
> [email protected]
> http://lists.randombit.net/mailman/listinfo/cryptography

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to