The Following User Says Thank You to pichlo For This Useful Post: | ||
|
2013-12-29
, 21:26
|
|
Posts: 1,012 |
Thanked: 817 times |
Joined on Jul 2007
@ France
|
#12
|
Thanks for the answers guys. I'm going to use Vigenere cipher with random generated keys that are as long as the encoded message and this is to my knowledge unbreakable. You can send messages with sms and Twitter and not NSA or your wife would be able to crack it. The problem with this cipher is that you have to keep your keys secret though and deliver them to your friend in a safe way, basically hand to hand. RSA type cipher is good but it's not theoretically unbreakable like Vigenere is.
But Vigenere cipher being unbreakable could mean that it's not legal to do ... in some countrys. Sweden is basically a US state when it comes to legal matters and I don't want a swat team kicking in my door giving me a single trip ticket to Gitmo. And I'm no criminal or anything but this is something I've been thinking about doing for almost twenty years when I first heard of the Vigenere cipher. So basically I'm doing it just because I want to but if it means trouble, like ie FSB puts Custodian in a black hole and destroys Openrepos servers I better not.
The Following User Says Thank You to Khertan For This Useful Post: | ||
|
2013-12-29
, 22:23
|
|
Posts: 513 |
Thanked: 651 times |
Joined on Feb 2011
@ Sweden
|
#13
|
You know, most things are decyphered not by breaking the crypting algo, but by breaking the PRNG
|
2013-12-30
, 16:27
|
|
Posts: 747 |
Thanked: 2,370 times |
Joined on May 2012
@ Moscow, Russia
|
#14
|
|
2013-12-31
, 20:46
|
|
Posts: 513 |
Thanked: 651 times |
Joined on Feb 2011
@ Sweden
|
#15
|
The Following User Says Thank You to xerxes2 For This Useful Post: | ||
|
2014-01-02
, 15:51
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#16
|
|
2014-01-02
, 16:07
|
Posts: 2 |
Thanked: 2 times |
Joined on Dec 2013
@ Gothenburg
|
#17
|
s/closed source/proprietary algorithm
Having worked for a crypto company myself (although not involved in the actual crypto stuff, so no tricky questions please, I am not an expert), I would have no problem using a commercial, closed-source application - as long as the actual algorithm is published. It is the guys that invent their own algorithms that I have no trust for. Security through obscurity is the least reliable kind.
The Following User Says Thank You to dschoepe For This Useful Post: | ||
|
2014-01-02
, 16:07
|
Posts: 1,423 |
Thanked: 2,620 times |
Joined on Jan 2011
@ Touring
|
#18
|
|
2014-01-02
, 16:15
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#19
|
Reinob,
If the computer takes a truly random seed, say a bare CCD facing a mildly radioactive object or even the input of the camera as the user randomly waves it around and you can get one time pad level seeding as good and probably far better than rolling dice or picking lottery number balls.
The Following User Says Thank You to reinob For This Useful Post: | ||
|
2014-01-02
, 16:36
|
|
Posts: 6,447 |
Thanked: 20,981 times |
Joined on Sep 2012
@ UK
|
#20
|
Having worked for a crypto company myself (although not involved in the actual crypto stuff, so no tricky questions please, I am not an expert), I would have no problem using a commercial, closed-source application - as long as the actual algorithm is published. It is the guys that invent their own algorithms that I have no trust for. Security through obscurity is the least reliable kind.