Re: Promising algorithm needs evaluation

Bruce Stephens <bruce+usenet@xxxxxxxxxxxxxxxxxxxx> wrote:
So you're taking the key and masking it with a fixed binary string, half
of whose bits are 0, and then using that to XOR? That means an attacker
can immediately read half the bits of the message, doesn't it?

It's a useful exercise for daniel777@xxxxxxxxxxxxxxx to figure out how
to read the remaining half. Hint: Adapt some attack against Vigenere.