TheOriginalBIT, on 28 February 2013 - 03:25 AM, said:
Draktharis, on 28 February 2013 - 03:23 AM, said:
add comments to explain how it works
Wouldn't be a very secure encryption system then would it
Actually the definition of an encryption protocol is that you CAN know every detail about how it works and that will not affect the encryption strength at all. This is even known as Rule #2 of Encryption.
Any protocol that works by hiding how it functions is by definition not "encryption" but just security through obscurity.
Only the encryption key should make any difference as to the cyphers strength.
If that is not the case, either the protocol is not encryption in the first place, or some mistake was made in the code causing an unintended side effect.
Not to mention security isn't binary, but a scale between "secure" on one side and "convenient" on the other.
The protocols strength mainly only depends how long it takes to brute force a cypher back into plain text. This gives you a value of time.
If that value is longer than you need the data to be protected for, then the strength is good enough.
For preventing real-time interception of rednet communications, this is definitely good enough.
To prevent someone from recording the encrypted communications and brute forcing it offline, perhaps it is and perhaps not, depending on the communications. Even assuming a "weak" strength of one month to brute force, then if you rotate your password/key every two weeks then it is certainly good enough.
Of course without trying and measuring how long it would take, that last one is harder to estimate. But at the very least it should show that the situation of setting a key once and never changing it again would never be a valid situation.