i think i ran in to the same problems.
Well i wrote a short paragraph, compiled and ran the program, here is the output of my ciphertext.txt file.
unfortunately the decrypt did not want to work, i tried several times differently, i dont know if i am missing something
what i mean by exposed is that it is plain text even if it is hiding among the safety of the other plausible messages. therefore it is nude.... exposed.
you missed the point. confidence in knowing that is the correct answer not bragging rights.
much better to do with a copy of the key for a reassured confident claim of undoing a one time pad. sure.
Huh? The key is supposed to be secret. A sane attacker who is in possession of the key (and knows the algorithm) would not bother with cryptanalysis. He/she would decrypt the ciphertext immediately. To talk about "a reassured confident claim of undoing a one time pad" in this context is thus rubbish.
got to love that ! meow !
Which also makes it, by the way, an excellent deniable encryption method. And it comes with plausible deniability as a bonus.
yes the standard one time pad is xor. we were discussing of using a full length size of the text key for vigenere as a one time pad. probably with out the chart reading would work too.
One time pads are usually implemented by XOR:
even an xor pad can be brute forced providing plain text. exposing the message along with a lot more text that has nothing to do with the message or key. even given all the extra it is still broken. what is done with the data is subjective and not relevant to it being broken.
even a short 13 char brute force generates 35 gigabytes of data. looking through the contest data 4 hours a day for a week i only got through 2 gigs. then did a shorter one. due to a programming error i made was the only reason type in key using the data did not work. if the program had worked correctly then that would have worked type in one key word at time with data.
getting hold of the key books is a valid way of "breaking the one time pad". meow.
As far as I know, historically one-time pads have indeed been broken (ones used by Soviet spies). But that was only because the opponents got hold of the key-books and / or the Soviets reused keys for several messages.
can we refrain from posting "break this" please and stick to the debate. thank you.
if your one time pad uses xor and 0 to 256 you can make a program to ignore anything that is not 'a' to 'z' or 'A' to 'Z' then use a spell checker to throw out nonwords. even though that will reduce the file size intelligence still has to be used to interpret any possible messages. the correct one or not.
breaking is a one time pad can be a quandary.