You are viewing a single comment's thread from:

RE: Quantum hacking.

in #cryptocurrencies7 years ago

I've known of the Vernam Cipher since reading about it in Scientific American way back in the early '80s... And I've written several implementations of it in code.

I'm of course interested in what you've done with jpegs, but (based entirely on your very brief description) my comment would be that as I understand one time pads, the only security is in the randomness of the keys. Thus I wouldn't expect a jpeg of any "real image" to be sufficiently random to be trusted.

I think metals are a good store of value, at least up until we can regularly mine the asteroids at a reasonable cost. ;)

I have found (in the past) at least partial copies of the Crypto Maverick's book on http://archive.org... If I come across that again I'll send you a link.

Thanks for your comprehensive reply, my friend! How is your big Tesla project coming along these days?

Sort:  

Here is my version. Watch the comKey() routine that selects just the compressed pixel data, which is quite random, I think. Also there is some other trickery to mislead the attackers.
The lab is being prepared for testing again. (starting last weekend as the rain season is finally over :) )
I'll do a short post on the cleaning up and preparing, soon.

Thanks for the code listing.

I look forward to your post on the lab progress. ;)

Coin Marketplace

STEEM 0.17
TRX 0.13
JST 0.028
BTC 59705.02
ETH 2619.44
USDT 1.00
SBD 2.39