# Re: Promising algorithm needs evaluation

*From*: kg <kristiag+news@xxxxxxxxxxxx>*Date*: Sat, 26 Feb 2011 20:45:43 +0000 (UTC)

Bruce Stephens <bruce+usenet@xxxxxxxxxxxxxxxxxxxx> wrote:

So you're taking the key and masking it with a fixed binary string, half

of whose bits are 0, and then using that to XOR? That means an attacker

can immediately read half the bits of the message, doesn't it?

It's a useful exercise for daniel777@xxxxxxxxxxxxxxx to figure out how

to read the remaining half. Hint: Adapt some attack against Vigenere.

--

kg

.

**Follow-Ups**:**Re: Promising algorithm needs evaluation***From:*daniel777

**References**:**Promising algorithm needs evaluation***From:*daniel777

**Re: Promising algorithm needs evaluation***From:*unruh

**Re: Promising algorithm needs evaluation***From:*daniel777

**Re: Promising algorithm needs evaluation***From:*Bruce Stephens

- Prev by Date:
**Re: Promising algorithm needs evaluation** - Next by Date:
**Re: Promising algorithm needs evaluation** - Previous by thread:
**Re: Promising algorithm needs evaluation** - Next by thread:
**Re: Promising algorithm needs evaluation** - Index(es):