- Bruce found a secure way to reuse a one-time pad.
- Bruce Schneier can crack a one-time pad before it's used.
- At college, Bruce Schneier had his way with so many women that his dorm room was called "The One-Time Pad.".
-http://www.schneierfacts.com/
And any encryption system that utilizes a properly implemented One-Time Pad technique is still completely unbreakable using analytic methods.-40hz (June 28, 2010, 02:29 PM)
40hz: An additional encryption-locker would be an interesting idea for some kind of NANY...-Crush (June 28, 2010, 04:01 PM)
The files were encrypted using Truecrypt and an unnamed algorithm, reportedly based on the 256-bit AES standard. In the UK, Dantas would be compelled to reveal his passphrase under threat of imprisonment, but no such law exists in Brazil.
40hz: I´ll do it. Tell me your wishes for such a program.
mwb1100: I made a file-encryptor with implemented OTP that has a hardware radioactivity as a source for pure randomness: Crush Cryptonizer (https://www.donationcoder.com/forum/index.php?topic=16071.0)-Crush (June 28, 2010, 07:32 PM)
In order to decrypt the file, you'd also need to use the same app that generated the complex password. So having the file and knowing what the encryption algorithm and user password was wouldn't help you decode it unless you knew the internally used password - or knew how to generate it.-40hz (June 29, 2010, 01:17 AM)
Since encryption algorithms depend on every byte in the encrypted file being correct, any change anywhere in the file makes decryption impossible.-40hz (June 28, 2010, 02:29 PM)
What if there were an encryption package that took a relatively easy to remember password and used that as a seed to produce a very complex, very long password that got used to do the actual encryption?I believe that most crypto packages do something along these lines by running your password through a hash algorithm (like SHA or MD5 or similar) and use the hash as the key to the cipher. Serious crypto packages will combine the password with a random 'salt' value before performing the hash so that the same password being used for different objects or sessions will generate a different set of key bits for the cipher.-40hz (June 29, 2010, 01:17 AM)
The salt isn't added to the password, otherwise the same password would have numerous key associated with it and you couldn't decrypt anything. The salt is added to the data to be encrypted. That way the same key and same data look different after encryption. When you decrypt the cipher you simply ignore the salt bits.-Eóin (June 29, 2010, 12:23 PM)
How about a password card (http://www.passwordcard.org/)?-joby_toss (June 29, 2010, 01:28 PM)