>
>No, such a thing would *not* be "like an OTP", but it might be like a
>stream cipher. An OTP has very severe rules for *how* the pad is
>generated. No algorithmic method, which you seem to imply, can
>generate a pad for an OTP. Again, an algorithmically generated pad is
>a stream cipher.
>
>You would hardly be the first to confuse the operation of an OTP,
>where the stream of pad characters is added/xor'd/whatever to the
>plaintext stream, with the real essence of OTP, which is how the pad
>is generated. The generation of the pad requires that each bit in the
>pad be unpredictable and entirely unrelated to any other bit in the
>pad.
>
>Consider that a house is not "like a car" because you've observed that
>it, like a car, has a roof and doors.
>
>Good cryptographic algorithms are hard, especially if you care about
>economy of key bit usage.
>
---------------- ------------------ ------------------ ----------------
>
>If the sender chooses the OTP on the fly then there is no way the
>recipient knows what it is, and cannot decrypt it. That is not crypto.
>If the sender sends the OTP to the recipient, then an Evesdropper can
>itnercept it. If the receiver can generate the same OTP then the system
>is not an OTP but maybe some sort of stream cypher..
>
Any talking starting with OTP related to my algorithm, i would have a
broken argument because of this, have no previous knowledge of OTP
before i made my specs and algorithm. *after that, i change nothing.
I have to admit, i made my specification and found it very good ( at my
point of view ). later, i implement it in c#. the cypher worked as spected.
( level of security :s *still to be proven or accepted widely ) i started
to make some research and found two references, FEISTEL STRUCTURE. OTP.
that are correlated with my specs. ( i found others but this are the main ).
The first for be a good specification. and the other for his strength.
-At this point must be obvious im a noob in crypto. last 3 months of interest
only. wich implies ( may be, im talkin garbage )-
After studing ( not carefully ), possible types of ( general attacks ).
i come with my specs, but without previous knowledge i found the need of
the rounds, i found the need of key schedule, i found the need of a IV,
and this is the good part for me: i found the need of other tree more
concepts. ( some of them were applied in my specification. ).
For that reason i start to making some research and found this:
IV : whas nothing new.
Key schedule : was nothing new.
iterating for the same crypto ( rounds ) : was nothing new.
( The process was a little bit of trouble -remember i have no previous
knowledge and my goal was found correlated process - ).
BUT, the other tree new process, - im not sure if there is something
out there or they are new. i can say this: i found nothing correlated YET.
the only possibly clue, is that making today's crypto is normally hard, and
with my specification, making crypto will be easyer for anyone normally.
This is true if my claims are true. ( still to prove of course ): a multitude
of public algorithms each one of them in the same strength. and working for
private communications* this is the result. If anyone can make good crypto.
for programmer that make his software, and now does not have to trust in the
strength of the public wide spread algorithms for his private crypto.
I think this approach is new ( is new for everyone of you? ), i have to
prove a lot of things.
As a side note: this is not my first try, i have failed many times
( in 3 months :s ) and found by my self the weakness in my algorithms.
For my current specs and algorithm, is hard to found a weakness, i have no
starting point. ( only brute force ).
-y