home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!newsgate.watson.ibm.com!yktnews!admin!wo0z!lwloen
- From: lwloen@rchland.vnet.ibm.com (Larry Loen)
- Subject: Re: Attack Methods
- Sender: news@rchland.ibm.com
- Message-ID: <1992Nov18.211712.25453@rchland.ibm.com>
- Date: Wed, 18 Nov 1992 21:17:12 GMT
- Reply-To: lwloen@vnet.ibm.com
- Disclaimer: This posting represents the poster's views, not necessarily those of IBM
- References: <1992Nov11.213535.17788@csc.ti.com> <1992Nov18.134243.24089@qiclab.scn.rain.com> <1992Nov18.190513.10997@cis.uab.edu> <1992Nov18.203413.11509@rchland.ibm.com>
- Nntp-Posting-Host: wo0z.rchland.ibm.com
- Organization: IBM Rochester
- Lines: 23
-
- In article I wrote:
-
- >Now, in the ordinary course of business, there will be several messages
- >of the same length. There may well be unique messages that have no
- >one of the same length, but we start with those of the same length.
- >What follows will tend to work even if the length of the real texts vary;
- >the only issue of interest is that the overall length is the same and that
- >the transposition step is performed _after_ the padding.
-
- It would have been better written as:
-
- "Now, in the ordinary course of business, there will be several messages
- of the same length which share the same cipher key. In a real, working
- example, it is impractical for all messages to have their own key.
- There may well be unique messages that have no other message
- with the same length, but we start with those of the same length.
- What follows will tend to work even if the length of the real texts vary;
- the only issue of interest is that the overall length is the same and that
- the transposition step is performed _after_ the padding."
-
- --
- Larry W. Loen | My Opinions are decidedly my own, so please
- | do not attribute them to my employer
-