Deutsch   English   Français   Italiano  
<427987b97a8ca27b2dfbe87e26050f617b07b46e@i2pn2.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: Chax Plore <ftilojim@tznvy.pbz>
Newsgroups: sci.crypt
Subject: Re: Naive PRNG encryption?
Date: Sat, 22 Feb 2025 13:08:36 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <427987b97a8ca27b2dfbe87e26050f617b07b46e@i2pn2.org>
References: <v8l1h5$3c3lj$1@dont-email.me>
Reply-To: ftilojim@tznvy.pbz
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 22 Feb 2025 12:08:38 -0000 (UTC)
Injection-Info: i2pn2.org;
	logging-data="1245340"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="5D73dK+H7GjKFvIMhrW+/Y4rYhlPmfLmJxEmTeWyt8M";
In-Reply-To: <v8l1h5$3c3lj$1@dont-email.me>
Content-Language: en-GB
X-Spam-Checker-Version: SpamAssassin 4.0.0
Bytes: 1606
Lines: 22

On 2024-08-03 12:41, vallor wrote:
> I saw someone mention this on another 'froup, and I've thought about it
> myself.  Is it really "uncrackable"?
> 
> Take a plaintext and transform each character with the output
> of a PRNG, with the seed being the key.
> 
> How easy is it to crack the resulting "ciphertext"?
> 

Make your PRNG a ChaCha20 and make your seed random and 256-bit,
and you will be OK.

Also: ISAAC seems fit for this job:
https://burtleburtle.net/bob/rand/isaacafa.html

Seed your CSPRNGs using KMACXOF256 on secret key and salt.

-- 

-----BEGIN PGP PUBLIC KEY FINGERPRINT-----
5745 807C 2B82 14D8 AB06 422C 8876 5DFC 2A51 778C
------END PGP PUBLIC KEY FINGERPRINT------