Encrypted data sample

Mark Talluto lists at canelasoftware.com
Thu Apr 10 14:10:01 EDT 2003


On Thursday, April 10, 2003, at 08:22 AM, Yates, Glen wrote:

>> I really don't know much about MC's encryption either.  The program
>> I posted relies on a keyFile with the same list of random numbers 
>> being
>> stored on each computer.  Unless someone else has access to that file 
>> or
>> is somehow reading the electronic emissions from your keyboard, the
>> encryption is in the form of a one-time pad which is the most secure 
>> form
>> of encryption possible.  As long as the keyFile is used only once and 
>> then
>> discarded or replaced, the code is unbreakable.
>>
>> Philip Chumbley
>
> Unbreakable! Ha, famous last words of an overconfident cryptologist!
>
> While I agree that a non-repeating key is the strongest form of 
> encryption,
> it is not neccessarily unbreakable, you have to look at how the key was
> generated, are the numbers truly random or not? If you use your 
> computer as
> you have done in the sample code to generate the key then they are not
> random but rather psuedo-random numbers. If that is the case, then the 
> code
> breaker can use knowledge of how the key was generated to help in 
> decrypting
> the data.
>
> To be more secure, you should use a truly random source of random 
> numbers,
> such as measurements of radioactive decay.
>
>
What is the marketing term for this type of encryption?  Is it:  
non-repeating key encryption?



Best regards,
Mark Talluto
http://www.canelasoftware.com




More information about the metacard mailing list