On Fri, Jun 26, 2015 at 11:01 AM, Ian Kelly <ian.g.ke...@gmail.com> wrote: > On Thu, Jun 25, 2015 at 6:33 PM, Chris Angelico <ros...@gmail.com> wrote: >> On Fri, Jun 26, 2015 at 1:26 AM, Jon Ribbens >> <jon+use...@unequivocal.co.uk> wrote: >>> Well, it means you need to send 256 times as much data, which is a >>> start. If you're instead using a 256-byte translation table then >>> an attack becomes utterly impractical. >>> >> >> Utterly impractical? <chomp analysis> > > You're making the same mistake that Steven did in misunderstanding the > threat model.
To be honest, I wasn't actually answering anything about the original threat model, but only responding to the statement that a 256-byte "anything-to-anything" cipher is somehow incredibly secure. It isn't, but that might not be a problem for the original purpose. ChrisA -- https://mail.python.org/mailman/listinfo/python-list