| Deutsch English Français Italiano |
|
<427987b97a8ca27b2dfbe87e26050f617b07b46e@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail From: Chax Plore <ftilojim@tznvy.pbz> Newsgroups: sci.crypt Subject: Re: Naive PRNG encryption? Date: Sat, 22 Feb 2025 13:08:36 +0100 Organization: i2pn2 (i2pn.org) Message-ID: <427987b97a8ca27b2dfbe87e26050f617b07b46e@i2pn2.org> References: <v8l1h5$3c3lj$1@dont-email.me> Reply-To: ftilojim@tznvy.pbz MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sat, 22 Feb 2025 12:08:38 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="1245340"; mail-complaints-to="usenet@i2pn2.org"; posting-account="5D73dK+H7GjKFvIMhrW+/Y4rYhlPmfLmJxEmTeWyt8M"; In-Reply-To: <v8l1h5$3c3lj$1@dont-email.me> Content-Language: en-GB X-Spam-Checker-Version: SpamAssassin 4.0.0 Bytes: 1606 Lines: 22 On 2024-08-03 12:41, vallor wrote: > I saw someone mention this on another 'froup, and I've thought about it > myself. Is it really "uncrackable"? > > Take a plaintext and transform each character with the output > of a PRNG, with the seed being the key. > > How easy is it to crack the resulting "ciphertext"? > Make your PRNG a ChaCha20 and make your seed random and 256-bit, and you will be OK. Also: ISAAC seems fit for this job: https://burtleburtle.net/bob/rand/isaacafa.html Seed your CSPRNGs using KMACXOF256 on secret key and salt. -- -----BEGIN PGP PUBLIC KEY FINGERPRINT----- 5745 807C 2B82 14D8 AB06 422C 8876 5DFC 2A51 778C ------END PGP PUBLIC KEY FINGERPRINT------