Deutsch   English   Français   Italiano  
<87y14piwtd.fsf@fatphil.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Phil Carmody <pc+usenet@asdf.org>
Newsgroups: sci.crypt
Subject: Re: Naive PRNG encryption?
Date: Wed, 21 Aug 2024 20:56:46 +0300
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <87y14piwtd.fsf@fatphil.org>
References: <v8l1h5$3c3lj$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Date: Wed, 21 Aug 2024 19:56:46 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="91c2e68accf0eeac989a131e548e1944";
	logging-data="4159810"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19Gtr24ytN73qaFwUpVLK1u"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
Cancel-Lock: sha1:5Uk3WcUcSrBvgMMIHWyQaGW672M=
	sha1:7ZCJJTnHFQacBiyxH4BbFy6Tf9k=
Bytes: 1842

vallor <vallor@cultnix.org> writes:
> I saw someone mention this on another 'froup, and I've thought about it 
> myself.  Is it really "uncrackable"?
>
> Take a plaintext and transform each character with the output
> of a PRNG, with the seed being the key.

That's just a stream cypher.

> How easy is it to crack the resulting "ciphertext"?

If you have more than one encrypted with the same key, probably pretty
easy, depending on the transform.  Just "subtract" (the inverse of the
transform) the two streams from each other, and you'll end up with the
difference between the two plain-texts, which will be highly non-uniform.

Phil
-- 
We are no longer hunters and nomads. No longer awed and frightened, as we have
gained some understanding of the world in which we live. As such, we can cast
aside childish remnants from the dawn of our civilization.
-- NotSanguine on SoylentNews, after Eugen Weber in /The Western Tradition/