XPost: sci.crypt   
   From: unruh@invalid.ca   
      
   On 2013-07-26, rossum wrote:   
   > On Fri, 26 Jul 2013 13:18:14 +0100, iamsam wrote:   
   >   
   >>Assuming I have a true RNG to generate the pad   
   > That is a far from trivial task. For a true RNG you need some very   
   > good sources of entropy in large enugh quantities to produce enough   
   > truly random key material.   
   >   
   >>and I have established a secure key transmission method   
   > For an OTP the key is as long as the message, and you need to send a   
   > new key for every new message. If you have a secure way to transmit   
   > something the size of your secret key then you can use exactly the   
   > same method to transmit the message itself, which is just as long as   
   > the key. In effect, just send the actual message on the secure   
   > channel you would have used for the key and forget about sending the   
   > key altogether.   
      
   The channel available for sending the key may not be available when the   
   message needs to be sent. There may be no message when the key channel   
   is open. In fact that is the usual situation for messages and keys.   
   Furthermore it may be possible to send a key without being able to send   
   a message by that channel-- think of quantum key exchange-- that quantum   
   channel cannot be used to send a message, but it can be used to generate   
   a key.   
      
   >   
   > The OTP does have its uses, but for many purposes it is not practical.   
   >   
   > rossum   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|