[vox-tech] Which cipher to use?

Ryan vox-tech@lists.lugod.org
Tue, 4 Jun 2002 22:44:12 -0700


On Tuesday 04 June 2002 10:33 pm, Bill Broadley wrote:
> On Tue, Jun 04, 2002 at 09:39:32PM -0700, Micah Cowan wrote:
> > This is really picky of course, but the other criteria for "secure us=
e
> > of Xor", in addition to having a key at least as long as your data,
> > is:
> >
> >   1. That it be a random sequence - *truly* random.  This rules out
> >      using "passphrases" and the like.  *All* passphrases or password=
s
> >      are extremely insecure for Xor, regardless of length.
>
> Correct, a passphrase would violate the xor sequence longer then the da=
ta
> rule.  Passing PID or time as a seed to random would also be a very
> bad idea.   Md5 checksums of random noise (transistors, radio reception
> of static, radioactive decay etc) is the level of randomness that is
> idea.

Hey, now there's an idea... I could use my TV tuner to gather data for th=
e=20
kernel entropy pool when I'm not watching tv with it.

Anyone know of something to do that? It'd be cool to play with.....