Re: encryption with pi
Date: Fri, 30 Jul 2004 16:44:45 GMT
Bill Unruh wrote:
> I doubt it. It is as hard for an attacker to generate the digits of pi as
> it is for the original user. Thus, attacks are efficient in comparison to
> use. That is a bad crypto system.
> You could use pi as a means of for example extending a PRNG, but again it
> would be slow.
The only good use for Pi in crypto is constants in sbox generation. Thanks
- Re: The time for genertating and testing a prime
... Take a prime Q of more than n/2 digits, ... Unnecessarily slow. ... These modular exponentiations are ... But it's a subset the attacker doesn't know about. ...
- Re: Ask EU - Norton AV 2006
... a password by taking the first letter (or first two or three letters) ... include digits, the number goes up to 36^6. ... punctuation characters increases the number still further. ... An exhaustion attack is one in which the attacker uses a program ...
- Re: Generating valid identifiers
... Unless an attacker can select the field names, in which case they may be ... collision attacks. ... If the OP sticks with his intention to use CRC32, ... cryptographically random, and only generates eight hex digits, not ten. ...