This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
This article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
User:Bassistphysicist added the claim "The current hope for perfect forward secrecy is hyper-encryption." I'm not an expert on this issue, but it seems to me that re-negotiating the session keys every once in a while (as in Off-the-record messaging) does already satisfy properties of 'perfect forward secrecy', so we don't need "hope" - it's already here. Thus, I decided to revert the edit for now. -- intgr 22:08, 28 April 2006 (UTC)
I think re-negotiating keys "once in a while" can not be the base of perfect forward secrecy. So, let's say, we re-negotiate once in 10 seconds. We use a connection for one second, then stop using it, and completely loose control over the connection at this point, and know, for the example, an adversary is able to fully control the connection including both end points from now. Now, should I worry about what the adversary can do during the next nine seconds - that is, gain information about the data transfered in the previous second? At least, I'm positive that in this kind on algorithm "once in a while" does not work, fundamentally. Volker Siegel (talk) 04:39, 9 March 2014 (UTC)
Why "appears" ?? An OTP REQUIRES that random data is used. Even the word "completely" is superfluous as there is no incomplete randomness. If something is not "completely" random it is NOT random. So in my opinion instead of "appears completely random" it should be "is random". Sorry, but our societys language seems to be more influenced by advetising bla bla than by scientific accuracy. JB --188.8.131.52 (talk) 14:16, 9 April 2014 (UTC)
It's talking about the ciphertext -- the output of OTP after encryption. There is information encoded in the ciphertext, but it nevertheless looks random. I think "appears" is appropriate given that, but I don't feel strongly either way. -- intgr[talk] 18:21, 9 April 2014 (UTC)