<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 01/15/2014 10:38 AM, Steve Furlong
      wrote:<br>
    </div>
    <blockquote
cite="mid:CAOFDsm1aSqVOWkT7uLyCjHENFcCADvXSNAoQzNuQOHeGAb02HA@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div class="gmail_extra">
          <div class="gmail_quote">On Wed, Jan 15, 2014 at 9:15 AM, Kent
            Borg <span dir="ltr"><<a moz-do-not-send="true"
                href="mailto:kentborg@borg.org" target="_blank">kentborg@borg.org</a>></span>
            wrote:</div>
          <div class="gmail_quote">> OTP has always ranged from
            difficult to impractical to securely deploy, and</div>
          <div class="gmail_quote">> the larger system where OTP is
            used will offer targets for attack, but</div>
          <div class="gmail_quote">> one-time-pads themselves are
            compromised??</div>
          <div class="gmail_quote"> </div>
          <div class="gmail_quote">Compromised PRNGs.</div>
        </div>
      </div>
    </blockquote>
    <br>
    Which is completely different.<br>
    <br>
    -kb, the Kent who doesn't want to see people crying that, say,
    AES-256 has been compromised either--not unless it has.<br>
  </body>
</html>