Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Jabor
Jul 16, 2010

#1 Loser at SpaceChem
Security researchers find flaws in consumer encryption algorithms distressingly often.

There's also evidence that state-sponsored groups like the NSA have been aware of these flaws long before security researchers found them, and have actively been exploiting those flaws to spy on internet traffic.

Adbot
ADBOT LOVES YOU

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
Delivery McGee, you seem pretty defensive about your posts being seen as "correct". Chillax a bit, there's no shame in having learned something new.

--

There is a fundamental difference between a true one-time-pad and an actual modern encryption algorithm. It's possible that with advances in mathematics or computing power, it will become possible to break encryption algorithms that, today, would require an infinite amount of time using the best known attacks against them. This possibility is why people spend so much time and effort looking for weaknesses in existing algorithms and coming up with new ones that are more resistant to those attacks.

A true one-time-pad, on the other hand, cannot be attacked in that way. There is no information that would allow you to distinguish between the actual message, and every other possible message of the same length.

  • Locked thread