| ▲ | rcxdude 2 days ago | |
I don't think you understand the point of the OTP and why it can't be brute forced: for any possible output, there is a corresponding one-time key. So you have no way to tell if the key you have come up with is correct, you can 'decrypt' an OTP ciphertext into a coherent sentence saying whatever you want in any language you want (the only constraint being maximum length), and bruteforcing will just give you all of them. | ||
| ▲ | rolph 2 days ago | parent [-] | |
oh i get it, the frequency of use is what allows frequency analysis. use a pad once then rotate to a new pad. [effectively re-key the encryption] avoid using characters in high frequency [vowels, language specific phonemes] use alternate misspellings, intentional typos. keep the message very brief, the longer the message the more effective frequency analysis becomes. try to avoid corelative events. if every time a cypher that looks like [abc] is captured, somthing, is bombed, or major troop movements occur, you have an idea what the message is about, giving a bit more leverage. also standard OTP pads use 2 axis, a tensor matrix is a better OTP. | ||