[vox-tech] Which cipher to use?
Ryan
vox-tech@lists.lugod.org
Tue, 4 Jun 2002 22:44:12 -0700
On Tuesday 04 June 2002 10:33 pm, Bill Broadley wrote:
> On Tue, Jun 04, 2002 at 09:39:32PM -0700, Micah Cowan wrote:
> > This is really picky of course, but the other criteria for "secure us=
e
> > of Xor", in addition to having a key at least as long as your data,
> > is:
> >
> > 1. That it be a random sequence - *truly* random. This rules out
> > using "passphrases" and the like. *All* passphrases or password=
s
> > are extremely insecure for Xor, regardless of length.
>
> Correct, a passphrase would violate the xor sequence longer then the da=
ta
> rule. Passing PID or time as a seed to random would also be a very
> bad idea. Md5 checksums of random noise (transistors, radio reception
> of static, radioactive decay etc) is the level of randomness that is
> idea.
Hey, now there's an idea... I could use my TV tuner to gather data for th=
e=20
kernel entropy pool when I'm not watching tv with it.
Anyone know of something to do that? It'd be cool to play with.....