Talk:Hyper-encryption
This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||
|
Hey guys,
[edit]I know this is incomplete, but Google only gave a couple good sources. If anybody cares, use Altavista or Lycos and see what you can get.
Cheers, brainybassist
Complete rewrite
[edit]I have now completely rewritten this article: it now needs expert review. -- Karada 20:03, 27 April 2006 (UTC)
Sounds Snake Oily To Me.
[edit]I am not familiar with the referenced paper, so I may be missing something, but the "plaintext" description of this "cryptosystem" sounds a lot like an OTP to me. Can anyone explain why this is NOT an OTP with another name? —Preceding unsigned comment added by 99.28.214.112 (talk) 19:29, 6 October 2010 (UTC)
- It definitively is not snake oil. Snake oil would mean that the authors make unfounded claims. This is not the case here. The papers use well defined assumptions and prove their results. The assumptions used in those papers are quite unconventional. E.g. the bounded-storage model assumes that there is a commonly accessible data stream that produces more bits than anyone can store. Such assumptions may make the resulting cryptosystem unpractical for most/all real-world applications, but that does not mean it snake oil. 81.62.29.213 (talk) 16:31, 7 October 2010 (UTC)
Sketchy at best
[edit]The Article describes a (rather clever) way to have "one time pads". Now, if anybody acts upon some information gained from secret communication, they'd communicate ("make public") the information that they had this information. So the point is kind of moot. That is, up to bullshit.
- Stub-Class Cryptography articles
- High-importance Cryptography articles
- Stub-Class Computer science articles
- High-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- Stub-Class Internet articles
- Low-importance Internet articles
- WikiProject Internet articles