On Wed, 30 Oct 2013 20:25, p...@spth.de said: > If we have plenty of randomness available, we could do this a
Entropy (which should be at the core of every CRNG) is a scarce resource. Thus a one time pad is not going to work because you need true random at the same size of the message. > XOR the message M with a random one-time pad P to obtain N. Encrypt P > with A, and N with B. > The drawback is that this doubles the lenth of the message. And that you need a way to securely convey the OTP to the recipient. The soviets had severe problems to do that during WWII and later and resorted to double use the one time pads. That was one of the origins of the UKUSA alliance aiming and succeeding at breaking there messages (project VENONA). Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users