TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

An (Important) Disproof of the One-Time Pad

8 pointsby chris-atalmost 10 years ago

9 comments

isaacgalmost 10 years ago
This entire article is utterly false and misconceived. It asserts that because "ONETIMEPAD" will be encrypted as "ONETIMEPAD" one time in 141167095653376, one time pads are not actually secure. The reason this is false is that just as often, "ONETIMEPAD" will be encrpted as "TWOTIMEPAD", or any other 10 letter string. Thus, the encryped string provides no information about the plain text, and so is perfectly encrypted. This article utterly wrong.
评论 #10076578 未加载
评论 #10072233 未加载
shalmanesealmost 10 years ago
Well, I now have a conclusive proof that I will never trust Zendo with my messages.
评论 #10106696 未加载
davidshepherd7almost 10 years ago
So it still fits the definition of perfect secrecy, but (with vanishingly small probability when the key is large) it&#x27;s possible for a key to be chosen that is more &quot;guessable&quot;?<p>I don&#x27;t think this is a problem. Depending on the guess for the key an attacker could get back <i>any possible message</i> as the plaintext. So there is no reason for them to believe that the message they obtain by using a simple key (e.g. AAAAAAAAAAAA as in the example) is the original plaintext?
评论 #10072215 未加载
评论 #10072225 未加载
panicalmost 10 years ago
I was skeptical at first, but it looks like TechCrunch&#x27;s foray into academic publishing is finally starting to pay off. It&#x27;s been amazing to follow their transition from a tech tabloid to a place you can find groundbreaking work in fields like cryptography.
评论 #10072644 未加载
DanBCalmost 10 years ago
This article makes me not trust Zendo.<p>If you&#x27;re going to take a pop at Shannon (and all the other cryptographers who support that) you probably need to i) have a cleaer description of what you&#x27;re doing and ii) do some math.
pckspcksalmost 10 years ago
And, sadly, completely incorrect.
Turing_Machinealmost 10 years ago
Next up: TechCrunch solves the halting problem by using<p><pre><code> while(1){ ; } </code></pre> and<p><pre><code> exit(1); </code></pre> as counterexamples.
Critoalmost 10 years ago
This is a case where the article author is <i>either</i> a moron, <i>or</i> a liar.<p>Either genuinely believe that he is correct (in which case he is a moron) or he <i>doesn&#x27;t</i> genuinely believe it, but is saying it for some reason (in which case he is a liar).<p>Those are the only two possibilities here, and neither is flattering.
benmmurphyalmost 10 years ago
tldr:<p>an adversary could make a really lucky guess at the key therefore onetime pad is insecure.