[Home]OTP

ec2-3-145-23-123.us-east-2.compute.amazonaws.com | ToothyWiki | RecentChanges | Login | Webcomic

Off Topic Post.




One Time Pad.

Get a wodge of totally random data as big as your plaintext. That's your key. XOR it together with your plaintext. The result is your ciphertext.

To decrypt, XOR the key with the ciphertext. You get your plaintext back.

If the key is truly random, there is no way of telling which of all possible plaintexts of the length of your ciphertext is the original plaintext without knowing the key. Given the three-letter OTP encrypted message "XYZ", for all you know it could be "yes", "no ", "cow", "Bob", or anything else.




Caveats:

Note that having people pick little wooden bingo balls out of a pot is NOT sufficiently random.  Modern methods of getting random data are (top end) does a radioactive particle decay in time, was a neutrino or cosmic ray seen, down to the low bit in a sample of noise data (from a weather antenna) or lowest end, your computer mike.  --Vitenka





Opposite track progression.  (The second layers spiral goes from the outside in, instead of starting again at the inside.)  This has advantages (no seek time delay when switching layers, which can lead to smoother playback with a smaller buffer requirement) and disadvantages (generally evil for writing, and can be a pain to lock onto tracks with what looks like a grid pattern)

The opposite is PTP (Paralell track progression) which does the more obvious and saner thing.  --Vitenka  (DVD terminology, may apply to other media too)




In fanon; One True Pairing.
Ugh.  I'm hoping this isn't really a word meaning 'fanfic-canon'.  Although an abbreviation for Kanon-fanfic might be survivable.  --Vitenka



CategoryAbbreviation

ec2-3-145-23-123.us-east-2.compute.amazonaws.com | ToothyWiki | RecentChanges | Login | Webcomic
This page is read-only | View other revisions | Recently used referrers
Last edited October 29, 2004 11:17 am (viewing revision 10, which is the newest) (diff)
Search: