Deutsch English Français Italiano |
<87y14piwtd.fsf@fatphil.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Phil Carmody <pc+usenet@asdf.org> Newsgroups: sci.crypt Subject: Re: Naive PRNG encryption? Date: Wed, 21 Aug 2024 20:56:46 +0300 Organization: A noiseless patient Spider Lines: 22 Message-ID: <87y14piwtd.fsf@fatphil.org> References: <v8l1h5$3c3lj$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain Injection-Date: Wed, 21 Aug 2024 19:56:46 +0200 (CEST) Injection-Info: dont-email.me; posting-host="91c2e68accf0eeac989a131e548e1944"; logging-data="4159810"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19Gtr24ytN73qaFwUpVLK1u" User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) Cancel-Lock: sha1:5Uk3WcUcSrBvgMMIHWyQaGW672M= sha1:7ZCJJTnHFQacBiyxH4BbFy6Tf9k= Bytes: 1842 vallor <vallor@cultnix.org> writes: > I saw someone mention this on another 'froup, and I've thought about it > myself. Is it really "uncrackable"? > > Take a plaintext and transform each character with the output > of a PRNG, with the seed being the key. That's just a stream cypher. > How easy is it to crack the resulting "ciphertext"? If you have more than one encrypted with the same key, probably pretty easy, depending on the transform. Just "subtract" (the inverse of the transform) the two streams from each other, and you'll end up with the difference between the two plain-texts, which will be highly non-uniform. Phil -- We are no longer hunters and nomads. No longer awed and frightened, as we have gained some understanding of the world in which we live. As such, we can cast aside childish remnants from the dawn of our civilization. -- NotSanguine on SoylentNews, after Eugen Weber in /The Western Tradition/