in reply to Re^2: Eliminate server-side state to obviate cookies
in thread "omniscient debugging" for Perl

People who talk about using one-time pads in practice are generally either military or idiots.

It takes a lot of work to generate (and in many cases to communicate) a one-time pad. Any reuse of data (or use of low-entropy random number generators) ruins the entire concept entirely, resulting in something that cryptographers assure me is easily broken. The required effort is fine for the military. But very few commercial applications find it feasible.

  • Comment on Re^3: Eliminate server-side state to obviate cookies

Replies are listed 'Best First'.
Re^4: Eliminate server-side state to obviate cookies
by thor (Priest) on Jul 07, 2005 at 03:32 UTC
    resulting in something that cryptographers assure me is easily broken
    Yup. When you implement an OTP with a cyclic key, it's called a Vigenere Cipher. The attack looks at letter frequencies and their distributions within the ciphertext.

    thor

    Feel the white light, the light within
    Be your own disciple, fan the sparks of will
    For all of us waiting, your kingdom will come