It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by dave420
reply to post by justyc
We already have 100% secure encryption that anyone can use. The one-time pad.
Originally posted by zsrgt
Originally posted by dave420
reply to post by justyc
Also generating the one-time pad is difficult, you can't use a conventional random number generator, they are always at best pseudo-random and that isn't good enough for a true one-time pad.
Is there any example of an encrypting device where a conventional random number generator is used? If so, what is the generator made of?
I found one example that demonstrates a protected data acquisition device that could be a tough cookie:
www.msnbc.msn.com...
What would be the best hi-tech counter-measure to deal with the trojan?
Originally posted by zsrgt
It also doesn't provide the receiver of the message with any authenticity.
Originally posted by Buck Division
Originally posted by zsrgt
It also doesn't provide the receiver of the message with any authenticity.
Disagree. At the very least, you can authenticate the user has the one-time pad. Hopefully, if nobody else has it, you know the message came from that user (because you can unencrypt it.)
Really, what we need as a one time pad is to use some microchip implanted in our body containing 10^23 random bits. Then, the one-time pad is indexed by the DNA sample of the person you are trying to communicate with.
Something like that.
Originally posted by zsrgt
Secure Cryptography comes down to 2 things, designing secure algorithms where as long as the key isn't known and can't be brute forced the cipher text is secure, and key distribution. We are very good at the first one, the second is more problematic.