Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Must I hold a candle to my shames? -- William Shakespeare, "The Merchant of Venice"


sci / sci.crypt / Re: Naive PRNG encryption?

SubjectAuthor
* Naive PRNG encryption?vallor
+- Re: Naive PRNG encryption?Chris M. Thomasson
+- Re: Naive PRNG encryption?Rich
`- Re: Naive PRNG encryption?Phil Carmody

1
Subject: Naive PRNG encryption?
From: vallor
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Sat, 3 Aug 2024 10:41 UTC
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: vallor@cultnix.org (vallor)
Newsgroups: sci.crypt
Subject: Naive PRNG encryption?
Date: Sat, 3 Aug 2024 10:41:41 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <v8l1h5$3c3lj$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 03 Aug 2024 12:41:42 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="d82ea081a5e1b9cef12b8648cd6d3949";
logging-data="3542707"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+k3onJ++ghKVDRZ1Mui7ak"
User-Agent: Pan/0.159 (Vovchansk; 26ff567; Linux-6.11.0-rc1)
Cancel-Lock: sha1:3MaOQi7TO1b5w/pRdquRBi5SZ0o=
X-Face: \}2`P"_@pS86<'EM:'b.Ml}8IuMK"pV"?FReF$'c.S%u9<Q#U*4QO)$l81M`{Q/n
XL'`91kd%N::LG:=*\35JS0prp\VJN^<s"b#bff@fA7]5lJA.jn,x_d%Md$,{.EZ
View all headers

I saw someone mention this on another 'froup, and I've thought about it
myself. Is it really "uncrackable"?

Take a plaintext and transform each character with the output
of a PRNG, with the seed being the key.

How easy is it to crack the resulting "ciphertext"?

--
-v

Subject: Re: Naive PRNG encryption?
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Sat, 3 Aug 2024 18:47 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: Naive PRNG encryption?
Date: Sat, 3 Aug 2024 11:47:38 -0700
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <v8lu0b$3it4o$2@dont-email.me>
References: <v8l1h5$3c3lj$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 03 Aug 2024 20:47:39 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c5d5c7fe7b787c73b28f56e08a59c030";
logging-data="3765400"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18aoSnS4NGMX5Hnzg3LMyYBJ7Qmbavwnbg="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:doVZWMQyxkwMoh6K+rKL09ZzptU=
In-Reply-To: <v8l1h5$3c3lj$1@dont-email.me>
Content-Language: en-US
View all headers

On 8/3/2024 3:41 AM, vallor wrote:
> I saw someone mention this on another 'froup, and I've thought about it
> myself. Is it really "uncrackable"?
>
> Take a plaintext and transform each character with the output
> of a PRNG, with the seed being the key.
>
> How easy is it to crack the resulting "ciphertext"?
>

Depends on the quality of the PRNG. You would probably want to use a
CSPRNG...

Subject: Re: Naive PRNG encryption?
From: Rich
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Sat, 3 Aug 2024 20:00 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: sci.crypt
Subject: Re: Naive PRNG encryption?
Date: Sat, 3 Aug 2024 20:00:36 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <v8m294$3jnbf$1@dont-email.me>
References: <v8l1h5$3c3lj$1@dont-email.me>
Injection-Date: Sat, 03 Aug 2024 22:00:37 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="8da313a9b19df90b85d5c7b57c4b6f09";
logging-data="3792239"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX199wVLiTgj8y5cIDXXH2sv8"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:sSD2mvwQBqEnym/E1RL4sHe0nA8=
View all headers

vallor <vallor@cultnix.org> wrote:
> I saw someone mention this on another 'froup, and I've thought about it
> myself. Is it really "uncrackable"?
>
> Take a plaintext and transform each character with the output
> of a PRNG, with the seed being the key.

https://web.pa.msu.edu/reference/pgpdoc1.html

When I was in college in the early seventies, I devised what I
believed was a brilliant encryption scheme. A simple pseudorandom
number stream was added to the plaintext stream to create
ciphertext. This would seemingly thwart any frequency analysis of
the ciphertext, and would be uncrackable even to the most
resourceful Government intelligence agencies. I felt so smug about
my achievement. So cock-sure.

Years later, I discovered this same scheme in several introductory
cryptography texts and tutorial papers. How nice. Other
cryptographers had thought of the same scheme. Unfortunately, the
scheme was presented as a simple homework assignment on how to use
elementary cryptanalytic techniques to trivially crack it. So much for
my brilliant scheme.

Subject: Re: Naive PRNG encryption?
From: Phil Carmody
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Wed, 21 Aug 2024 17:56 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: pc+usenet@asdf.org (Phil Carmody)
Newsgroups: sci.crypt
Subject: Re: Naive PRNG encryption?
Date: Wed, 21 Aug 2024 20:56:46 +0300
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <87y14piwtd.fsf@fatphil.org>
References: <v8l1h5$3c3lj$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Date: Wed, 21 Aug 2024 19:56:46 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="91c2e68accf0eeac989a131e548e1944";
logging-data="4159810"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19Gtr24ytN73qaFwUpVLK1u"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
Cancel-Lock: sha1:5Uk3WcUcSrBvgMMIHWyQaGW672M=
sha1:7ZCJJTnHFQacBiyxH4BbFy6Tf9k=
View all headers

vallor <vallor@cultnix.org> writes:
> I saw someone mention this on another 'froup, and I've thought about it
> myself. Is it really "uncrackable"?
>
> Take a plaintext and transform each character with the output
> of a PRNG, with the seed being the key.

That's just a stream cypher.

> How easy is it to crack the resulting "ciphertext"?

If you have more than one encrypted with the same key, probably pretty
easy, depending on the transform. Just "subtract" (the inverse of the
transform) the two streams from each other, and you'll end up with the
difference between the two plain-texts, which will be highly non-uniform.

Phil
--
We are no longer hunters and nomads. No longer awed and frightened, as we have
gained some understanding of the world in which we live. As such, we can cast
aside childish remnants from the dawn of our civilization.
-- NotSanguine on SoylentNews, after Eugen Weber in /The Western Tradition/

1

rocksolid light 0.9.8
clearnet tor