Deutsch English Français Italiano |
<v8m294$3jnbf$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!2.eu.feeder.erje.net!feeder.erje.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Rich <rich@example.invalid> Newsgroups: sci.crypt Subject: Re: Naive PRNG encryption? Date: Sat, 3 Aug 2024 20:00:36 -0000 (UTC) Organization: A noiseless patient Spider Lines: 24 Message-ID: <v8m294$3jnbf$1@dont-email.me> References: <v8l1h5$3c3lj$1@dont-email.me> Injection-Date: Sat, 03 Aug 2024 22:00:37 +0200 (CEST) Injection-Info: dont-email.me; posting-host="8da313a9b19df90b85d5c7b57c4b6f09"; logging-data="3792239"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX199wVLiTgj8y5cIDXXH2sv8" User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64)) Cancel-Lock: sha1:sSD2mvwQBqEnym/E1RL4sHe0nA8= Bytes: 2004 vallor <vallor@cultnix.org> wrote: > I saw someone mention this on another 'froup, and I've thought about it > myself. Is it really "uncrackable"? > > Take a plaintext and transform each character with the output > of a PRNG, with the seed being the key. https://web.pa.msu.edu/reference/pgpdoc1.html When I was in college in the early seventies, I devised what I believed was a brilliant encryption scheme. A simple pseudorandom number stream was added to the plaintext stream to create ciphertext. This would seemingly thwart any frequency analysis of the ciphertext, and would be uncrackable even to the most resourceful Government intelligence agencies. I felt so smug about my achievement. So cock-sure. Years later, I discovered this same scheme in several introductory cryptography texts and tutorial papers. How nice. Other cryptographers had thought of the same scheme. Unfortunately, the scheme was presented as a simple homework assignment on how to use elementary cryptanalytic techniques to trivially crack it. So much for my brilliant scheme.