Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Physicist

Hmmm. It looks like we'll be seeing some very long keys being used by those who need/want privacy. Enough RAID 0s (interleaving) in RAID arrays will make that feasible, though.

...time to review a few things. I don't need such encryption, but others will want it.


27 posted on 11/10/2005 9:30:55 PM PST by familyop ("Let us try" sounds better, don't you think? "Essayons" is so...Latin.)
[ Post Reply | Private Reply | To 16 | View Replies ]


To: familyop
Hmmm. It looks like we'll be seeing some very long keys being used by those who need/want privacy. Enough RAID 0s (interleaving) in RAID arrays will make that feasible, though.

Actually, for many applications, the one-time pad is actually quite practical. Consider that if all my communication with someone is via 115.2kbps link, a 40GB hard drive could hold enough 'pad' to encrypt about 2.5 years' worth of continuous transmissions. So, before my agent goes out into the field I fill up his hard drive with some carefully-generated random data and keep a copy for myself. To be sure, generation of 40GB of really good random data is not exactly trivial, but I believe there are some cryptographically-sound methods of "stretching" randomness (there are some risks entailed with this, and it's easy to go very badly wrong, but it's possible to arrange things so that inferring anything about a particular bit, even given infinite computing power, would require access to so many other bits that an adversary with such access would likely have access to the entire key anyway).

29 posted on 11/10/2005 10:15:59 PM PST by supercat (Don't fix blame--FIX THE PROBLEM.)
[ Post Reply | Private Reply | To 27 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson