Remix.run Logo
rcxdude 2 days ago

I don't think you understand the point of the OTP and why it can't be brute forced: for any possible output, there is a corresponding one-time key. So you have no way to tell if the key you have come up with is correct, you can 'decrypt' an OTP ciphertext into a coherent sentence saying whatever you want in any language you want (the only constraint being maximum length), and bruteforcing will just give you all of them.

rolph 2 days ago | parent [-]

oh i get it, the frequency of use is what allows frequency analysis.

use a pad once then rotate to a new pad. [effectively re-key the encryption]

avoid using characters in high frequency [vowels, language specific phonemes]

use alternate misspellings, intentional typos.

keep the message very brief, the longer the message the more effective frequency analysis becomes.

try to avoid corelative events.

if every time a cypher that looks like [abc] is captured, somthing, is bombed, or major troop movements occur, you have an idea what the message is about, giving a bit more leverage.

also standard OTP pads use 2 axis, a tensor matrix is a better OTP.