|
Security researchers find flaws in consumer encryption algorithms distressingly often. There's also evidence that state-sponsored groups like the NSA have been aware of these flaws long before security researchers found them, and have actively been exploiting those flaws to spy on internet traffic.
|
# ¿ Jul 29, 2016 04:22 |
|
|
# ¿ Apr 27, 2024 09:33 |
|
Delivery McGee, you seem pretty defensive about your posts being seen as "correct". Chillax a bit, there's no shame in having learned something new. -- There is a fundamental difference between a true one-time-pad and an actual modern encryption algorithm. It's possible that with advances in mathematics or computing power, it will become possible to break encryption algorithms that, today, would require an infinite amount of time using the best known attacks against them. This possibility is why people spend so much time and effort looking for weaknesses in existing algorithms and coming up with new ones that are more resistant to those attacks. A true one-time-pad, on the other hand, cannot be attacked in that way. There is no information that would allow you to distinguish between the actual message, and every other possible message of the same length.
|
# ¿ Jul 31, 2016 10:35 |