|
2014-01-02
, 18:53
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#22
|
Not quite. You can pre-generate say a thousand OTPs and give them to both parties, then use (and destroy) them one by one. In case of secure SMS, the OTPs have a finite length so not even too much resources spent. Of course keeping a bunch of OTPs for future use has its own problems but at least it is doable.
|
2014-01-02
, 23:45
|
Posts: 2 |
Thanked: 2 times |
Joined on Dec 2013
@ Gothenburg
|
#23
|
It is doable, but only if (as in necessary, not sufficient) the key/password is typed by the user and never pre-stored on the phone.
The Following User Says Thank You to dschoepe For This Useful Post: | ||
Please stop saying this. Vigenere is breakable. What you are describing is more correctly referred to as a one time pad (as other have suggested) .
There are a number of problems with implementing effective one time pad solutions, e.g.
1) securely communicating the key to the recipient
2) key must be kept secure
2) key must only be used once
3) key must be completely random
4) key must be at least as long as the message
Basically, as Steve Bellini said: "As a practical person, I've observed that one-time pads are theoretically unbreakable, but practically very weak. By contrast, conventional ciphers are theoretically breakable, but practically strong."