Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S265608AbUALUhQ (ORCPT ); Mon, 12 Jan 2004 15:37:16 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S265610AbUALUhP (ORCPT ); Mon, 12 Jan 2004 15:37:15 -0500 Received: from mail.webmaster.com ([216.152.64.131]:53986 "EHLO shell.webmaster.com") by vger.kernel.org with ESMTP id S265608AbUALUhL (ORCPT ); Mon, 12 Jan 2004 15:37:11 -0500 From: "David Schwartz" To: "tabris" , "Hunt, Adam" Cc: Subject: RE: SecuriKey Date: Mon, 12 Jan 2004 12:37:06 -0800 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.6604 (9.0.2911.0) In-Reply-To: <200401111446.27403.tabris@tabris.net> X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2055 Importance: Normal Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1883 Lines: 43 > How do you generate a one-time-pad? a one time pad must be > by definition > truly random, and be used only once. and if you can send the Securikey > via a secure channel at the same time as the message, then you don't need > the OTP. To truly qualify as an OTP, the data would have to be random, used once, and somehow securely transfered to both ends of what will be the secure channel. This is, shall we say politely, seldom done for modern cryptography. However, many modern encryption schemes do require data that must be unpredictable. If you want to encrypt a message using RSA, you generally use a random key for a symmetric cypher and use RSA to protect the random key rather than the (usually larger) message itself. > I should also mention that the problem with 'generating' an > OTP via any > mechanical or algorithmic means is impossible as at best an OTP will only > be pseudo-random, and therefore with identical inputs (assuming it is > possible, which we can assume here for the sake of theory and security), > the same OTP can be generated, thus breaking our assumption/necessity of > non-deterministic output. Except we don't live in a deterministic world, we live in a quantum world. It is nearly trivial to mechanically produce data that is truly random. All you need is a reverse biased zener diode. Even if you do believe the world is deterministic, against the weight of modern science, I really doubt you believe that anyone outside a sealed box can predict microscopic zone temperature variations within a box and therefore predict the phase jitter between two crystal oscillators inside it. DS - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/