Pure Python Data Mangling or Encrypting

Chris Angelico rosuav at gmail.com
Thu Jun 25 22:05:09 EDT 2015


On Fri, Jun 26, 2015 at 11:01 AM, Ian Kelly <ian.g.kelly at gmail.com> wrote:
> On Thu, Jun 25, 2015 at 6:33 PM, Chris Angelico <rosuav at gmail.com> wrote:
>> On Fri, Jun 26, 2015 at 1:26 AM, Jon Ribbens
>> <jon+usenet at unequivocal.co.uk> wrote:
>>> Well, it means you need to send 256 times as much data, which is a
>>> start. If you're instead using a 256-byte translation table then
>>> an attack becomes utterly impractical.
>>>
>>
>> Utterly impractical? <chomp analysis>
>
> You're making the same mistake that Steven did in misunderstanding the
> threat model.

To be honest, I wasn't actually answering anything about the original
threat model, but only responding to the statement that a 256-byte
"anything-to-anything" cipher is somehow incredibly secure. It isn't,
but that might not be a problem for the original purpose.

ChrisA



More information about the Python-list mailing list