Ethics: Codes
-
-
mith Godfather
- Godfather
- Godfather
- Posts: 9267
- Joined: March 27, 2002
- Location: McKinney, TX
Indeed, if what you're talking about is a one-time pad, you can just make up an approrpriate key later on.
Another XOR code possibility would be to split your claim into two pieces and XOR them against each other. This is much more difficult (nearly impossible) to fake, but is also more vulnerable to being broken.-
-
VisMaior Flip Out!
- Flip Out!
- Flip Out!
- Posts: 3776
- Joined: June 22, 2005
- Location: Budapest
Right, but not if you have a password of minimal length (like, 8 chars or so) and repeat the word over and over. No real problem, people using a key as long as the messge iotself are claiming false.If I'm not mistaken, with XOR encryption, you can make up a key afterward that turns the encrypted post into absolutely any message you want."logic is in the eye of the beholder" -LyingBrian in Eyewitness 1
"correct me if i'm wrong, but isn't the CHANCE of something happening always 50% (either it will or it won't)?" -LyingBrian in BJs Wild West mafia-
-
mith Godfather
- Godfather
- Godfather
- Posts: 9267
- Joined: March 27, 2002
- Location: McKinney, TX
-
-
Fiasco Goon
- Goon
- Goon
- Posts: 834
- Joined: September 21, 2005
That does seem like it would work, but maybe there's some sort of clever way to find a few different meaningful messages that could be turned to the same code using different repeating keys? It seems unlikely, but with RSA you have a full guarantee.
edit: Mith: how long is "long enough"? With just a few lines of encoded text available, is there any chance to break it in practice? I'd guess not."I beseech you, in the bowels of Christ, think it possible you may be mistaken." - Oliver Cromwell-
-
VisMaior Flip Out!
- Flip Out!
- Flip Out!
- Posts: 3776
- Joined: June 22, 2005
- Location: Budapest
Vigenère, no, I dont mean that. Exclusive-OR, thats what I mean.
For every bit in the encrypted data we take the appropriate bit in the ley. If Keybit(n)==1, we invert the textbit. Otherwise we do nothing.
Basically, its a bitwise XOR operation between the text and the key. Unbreakable without the key, as the information in every bit of the text is exactly half a bit. No correlatiopn whatsoever with the next bit. With short keys repetitively added it shows some degree of vulnerability, wich is actually dispatched quiet easily, but for the purposes of a forum game, it should proove unbreakable even so."logic is in the eye of the beholder" -LyingBrian in Eyewitness 1
"correct me if i'm wrong, but isn't the CHANCE of something happening always 50% (either it will or it won't)?" -LyingBrian in BJs Wild West mafia-
-
mith Godfather
- Godfather
- Godfather
- Posts: 9267
- Joined: March 27, 2002
- Location: McKinney, TX
I know what XOR means...
What I mean is it's essentially identical to Vigenère. As you've stated there, it's certainly not unbreakable, and is in fact quite vulnerable. But sure, you can modify it various ways to make it secure (though if you're going to do that, it's really no simpler to use than RSA).-
-
Norinel Not Voting (3)
- Not Voting (3)
- Not Voting (3)
- Posts: 1684
- Joined: March 2, 2003
- Location: My computer
-
-
ralphmerridew Goon
- Goon
- Goon
- Posts: 229
- Joined: May 7, 2002
Regarding XOR:
If you're allowed to use a random key as long as the message, it's unbreakable, but useless because the mafia can choose a key that will decrypt to any message they want.
If you use grammatically correct English text for the key, then the message can probably be broken with a moderate amount of effort.
(Once somebody XORed two sentences against each other and gave the result; I was able to work out the originals in about an hour.)
Copyright © MafiaScum. All rights reserved.