Mfw I just figured out 100% uncrackable cryptography for 2 parties to exchange messages indefinitely provided the...

>mfw I just figured out 100% uncrackable cryptography for 2 parties to exchange messages indefinitely provided the initial key is exchanged in person
What should my next step be considering I don't want to be fucking disappeared by the NSA? The world must know or my work.

Other urls found in this thread:

xkcd.com/538/
twitter.com/NSFWRedditVideo

xkcd.com/538/

>I just figured out 100% uncrackable cryptography for 2 parties to exchange messages indefinitely provided the initial key is exchanged in person
No you didn't.

>What should my next step be
Study some cryptology and information theory until you understand why your claim is bullshit.

>xkcd
>linking to xkcd
>knowing that particular comic off the top of your head
gas chamber

>gas chamber
laughing gas because I am lmaoing @ your "life" right now

wel ur gay

You rediscovered one-time-pad? Go suck a dick you noob.

btfo

Can you provide us with a brief description of the work?

Also if you aren't math PhD, gtfo

...

CYA KID

>cryptology

Yes, cryptology. That's what the field is called.

all you need is an indefinitely long key?

How will ever recover?

Technically, reading encrypted messages is cryptology. Writing them is cryptography.

dna

You submit a small blood sample with a smartphone add on

...

Already exists and a physical copy of a key is an extreme liability.

>Technically, reading encrypted messages is cryptology. Writing them is cryptography.
Not so. Writing them is cryptography; reading them is called cryptanalysis. Cryptology is the two subfields combined (they are obviously related).

Nobody on Sup Forums cares. Try /sci/?

Step 1) Meet partner in person to create a 1-time pad
Step 2) Encrypt a new 1-time pad with the 1-time pad you both agreed on and send to partner
Step 3) Partner decrypts the new 1-time pad and uses it to encrypt a 3rd 1-time pad that he sends back to you
Rinse and repeat

Completely uncrackable

Cool but this isn't commonly done because it doubles the required bandwidth of the comm. channel. Block and stream ciphers are "good enough" and use resources more efficiently.

Do you ever exchange any actual payload bits?

1-time pads

You really didn't think this through.

OSHI-

Uncrackable? What does that mean? Given infinite resources and infinite time you would never get the data? Does it even exist?

Yes a one time pad is proved to be uncrackable in that as long as the key is truly random, there is no way to recover the plaintext without the key, no matter the time and resources. But the key needs to be as long as the plaintext, which is the main downside of the OTP.

>Tfw Bob and Alice are just piping /dev/random to each other, knowing what they have to say already.

You are missing a key point here, with infinite resources eventually you just get the plaintext randomly. The hard part of proving that's it

Yeah you're not "getting" anything. You don't even need the cyphertext to just guess the message, dumbass.

Lmao encryption is retarded.
Just beat the nigga up.

>The hard part of proving that's it
It's impossible with the one-time pad. That's literally the reason it has to be 1 time.
The one time pad makes a scenario where every single possible message of the length of the pad has the _exact_ same probability.

A message saying "hey, let's blow up the whitehouse today" has the exact same probability as a message saying "hey, let's send the whitehouse flowers." Unless you use the pad more than once there is no way for them to ever prove which.

hide yerrself best u can and then just post how..

>lmaoing @ your life
Funny how that doesn't sound as weird anymore.

Nothing personal, kid.

Lol AES is probably all of those things jeez

>nobody cares if they're wrong
What the hell is this, Detroit?

You mean a one time pad?
Yeah, that's been known for centuries.

No, it's neo-Sup Forums, a bad combination of Sup Forumseddit and Sup Forums.

...

One-time pad requires one pad character per one message character. Either you encrypt more than one character(and thus it's no longer uncrackable) or you have only one pad of characters in total. Reusing the pad can, and has lead to cracking it, way back in ww2.

Post it

Start by posting it online.

You are too late kiddo...

And the best part is Diffie Hellman doesnt even need key transfer in person.

Guys, I just figured out a new encryption method
Just shuffle the letters by a number

A to C and D to F for example if we use "2"
Aren't I a genius