posted on Dec, 8 2010 @ 01:08 PM
Wow, people never cease to amaze me...
This is a classic Vernam encryption method. It uses a ONE TIME PAD. Julian Assange is likely the ONLY PERSON ON EARTH who knows the one time pad or
where to find it, and in all likelihood, has made extensive arrangements to make sure it is accessible to the right people at the right time. I doubt
the one time pad would be referred to in an email because that would make it to easy for someone to footprint and find out. Whatever Assange has at
play is in motion and can not be stopped by anyone IMO.
The legend being referred to is the key that has to be used in combination with the "password" that may or may not be the one in the YouTube video
presented by the OP. It could very well be the correct password. If the video is accurate, the legend (one time pad) would be contained in the email
that is referred to and would be a WORD OR PHRASE that when bit-shifted and combined with the password, would create the correct key. If you do not
have the above mentioned word or phrase, you will NEVER crack the encryption. As I said, I doubt this would be in both a YT video or an email.
AND....All this talk about NSA and government cracking a 256-bit cipher using Vernam encryptions is laughable at best. You guys have no idea what you
are talking about. All of the country's Cray's combined could not crack this in our lifetime, so please stop with that nonsense and just do some
research to understand how encryption works and how long it's been used to keep secrets a secret. While you are at it, make sure you can do the math
so you understand how long, in computer processing time, it would take to brute force a 256 bit encrypted string... good luck with that. People can
say what they want, but being in the business, I have yet to personally see a 256 bit cipher cracked by anyone or any country, so unless you have
proof otherwise, it doesn't exist.... yet. (hello quantum computing!)