This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of
Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography articles
Also, the method described as Bruce Schneier's is in fact the plain old one-time pad (creating a random stream of bits and then using it the encrypt the plaintext.) In that case, adding another layer of encryption (whatever it is that Mr. Schneier is proposing) is pointless as the cypher is already unbreakable.
69.165.143.15 (
talk)
23:09, 11 April 2016 (UTC)reply
This is so if and only if, the random block used is, in fact, random, and if and only if, it can be securely transmitted to the recipient without compromise, and is never thereafter compromised. The one time pad is not all easy to use, and to be certain you're actually using it in a particular instance.
69.118.209.149 (
talk)
16:19, 1 November 2016 (UTC)reply
This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of
Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join
the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography articles
Also, the method described as Bruce Schneier's is in fact the plain old one-time pad (creating a random stream of bits and then using it the encrypt the plaintext.) In that case, adding another layer of encryption (whatever it is that Mr. Schneier is proposing) is pointless as the cypher is already unbreakable.
69.165.143.15 (
talk)
23:09, 11 April 2016 (UTC)reply
This is so if and only if, the random block used is, in fact, random, and if and only if, it can be securely transmitted to the recipient without compromise, and is never thereafter compromised. The one time pad is not all easy to use, and to be certain you're actually using it in a particular instance.
69.118.209.149 (
talk)
16:19, 1 November 2016 (UTC)reply