[Cryptography] New White Paper: GhostLine - Information-Theoretically Secure Multi-Party Chat

Dennis Hamilton orcmid at msn.com
Sun Jan 4 00:52:08 EST 2026



-----Original Message-----
From: Patrick Chkoreff
Sent: Saturday, January 3, 2026 14:45
To: cryptography at metzdowd.com
Subject: Re: [Cryptography] New White Paper: GhostLine - Information-Theoretically Secure Multi-Party Chat

On 1/2/26 3:01 PM, Ray Dillinger wrote:

> The thing you missed is that knowing any one of the 256 bit blocks in 
> the OTP sequence is terrifyingly easy and can be done by passive 
> eavesdropping.

To recap, I had previously described a way to generate a pseudo-random OTP versus a truly-random OTP.

I was of course assuming that the OTP would never be reused, not even one block -- EVER.  That's the primary rule of using an OTP.  In that ideal perfect case, there cannot be a known-plaintext attack.

[orcmid] --- Response --

When I saw the remark by Ray Dillinger, I presumed he was talking about a known-plaintext attack and that successfully catching the encryption of *one* known block would reveal the continuation of the proposed (deterministic?) OTP over the rest of the cipher-text.  It has noting to do with reusing the OTP, but discovering its deterministic generation.

Is that not the fragility being pointed to here?

 - Dennis


More information about the cryptography mailing list