Search results

Jump to navigation Jump to search
  • {{r|One-time pad}}
    2 KB (194 words) - 14:48, 4 April 2024
  • ...ne from [[cryptography#cryptanalysis|cryptanalysis]] because it used the [[one-time pad]] system, Soviet resource constraints apparently caused them to copy or reu
    5 KB (731 words) - 05:48, 8 April 2024
  • ...with the plaintext bit by bit or character by character, somewhat like the one-time pad. In a stream cipher, the output stream is created based on an internal sta
    4 KB (546 words) - 05:48, 8 April 2024
  • ...ee passive attacks that will ''in theory'' break any [[cipher]] except a [[one-time pad]]; variants of these work for either [[block cipher]]s or [[stream cipher]]
    3 KB (440 words) - 05:49, 8 April 2024
  • A [[one-time pad]], which is provably secure against cryptanalysis, has a totally random key A one-time pad must absolutely, positively, be used only once. Even two uses, with differe
    12 KB (1,744 words) - 05:48, 8 April 2024
  • A [[one-time pad]] is in effect the ultimate stream cipher. It requires a ''truly'' random k ...mproved, the security asymptotically approaches the provable security of a one-time pad. Of course it can never reach that, but with a good generator it may be clo
    24 KB (3,851 words) - 05:49, 8 April 2024
  • ...with his WWII work at [[Bell Labs]], [[Claude Shannon]] proved that the [[one-time pad]] cipher is unbreakable, provided the key material is truly [[random number ...project that allowed cryptanalysis of Soviet espionage traffic, in which a one-time pad was used more than once.
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...with his WWII work at [[Bell Labs]], [[Claude Shannon]] proved that the [[one-time pad]] cipher is unbreakable, provided the key material is truly [[random number ...project that allowed cryptanalysis of Soviet espionage traffic, in which a one-time pad was used more than once.
    32 KB (4,916 words) - 05:49, 8 April 2024
  • A truly random one-time pad ''may'' be generated with a combination of measurement of a random physical ...y of historical interest, but typist patterns did cause weakness in some [[one-time pad]]s. It is hard to imagine why manual generation would be useful today.
    23 KB (3,650 words) - 05:49, 8 April 2024
  • ...k:Sandy_Harris/Permission]]. Some of it I've already used here, e.g. see [[One-time pad]], but I'm busy with other stuff, don't have time to move it all in. Not al
    7 KB (1,208 words) - 07:39, 26 December 2015
  • ...a key by brute force testing is theoretically possible, except against a [[one-time pad]], but the search time becomes practical only if the number of keys to be t
    11 KB (1,819 words) - 05:48, 8 April 2024
  • |ISBN=0-521-79172-3}}</ref> With one notable exception - the [[one-time pad]] - these contingent proofs are the best available for cryptographic algori
    9 KB (1,312 words) - 05:49, 8 April 2024
  • ...ecret &mdash; is not usually a good approach. Nor, in most cases, are a [[one-time pad]] which needs a key as large as the whole set of messages it will protect, Another method, usable manually or on a computer, is a [[one-time pad]]. This works much like a stream cipher, but it does not need to generate a
    52 KB (8,332 words) - 05:49, 8 April 2024
  • ...traffic. While the Soviets had originally used theoretically unbreakable [[one-time pad]]s for the traffic, some of their operations violated communications securi
    25 KB (3,805 words) - 22:34, 14 June 2009
  • In theory, any cipher except a [[one-time pad]] can be broken by a [[brute force attack]]; the enemy just has to try keys
    53 KB (8,371 words) - 05:48, 8 April 2024
View ( | ) (20 | 50 | 100 | 250 | 500)