<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="moz-cite-prefix">On 01/15/2014 10:38 AM, Steve Furlong
wrote:<br>
</div>
<blockquote
cite="mid:CAOFDsm1aSqVOWkT7uLyCjHENFcCADvXSNAoQzNuQOHeGAb02HA@mail.gmail.com"
type="cite">
<div dir="ltr">
<div class="gmail_extra">
<div class="gmail_quote">On Wed, Jan 15, 2014 at 9:15 AM, Kent
Borg <span dir="ltr"><<a moz-do-not-send="true"
href="mailto:kentborg@borg.org" target="_blank">kentborg@borg.org</a>></span>
wrote:</div>
<div class="gmail_quote">> OTP has always ranged from
difficult to impractical to securely deploy, and</div>
<div class="gmail_quote">> the larger system where OTP is
used will offer targets for attack, but</div>
<div class="gmail_quote">> one-time-pads themselves are
compromised??</div>
<div class="gmail_quote"> </div>
<div class="gmail_quote">Compromised PRNGs.</div>
</div>
</div>
</blockquote>
<br>
Which is completely different.<br>
<br>
-kb, the Kent who doesn't want to see people crying that, say,
AES-256 has been compromised either--not unless it has.<br>
</body>
</html>