— Do you? You are basically stating random facts, copying parts of wikipedia, changing your statements
— Not really
— The attack works because the program was able to read the source of randomness used in AES
— Meaning that it could effectively predict how the key changed
"hey, implementing it is really hard and even the most extensively tested libaries have bugs""let's rewrite it from scratch, by myself"
— >"hey, implementing it is really hard and even the most extensively tested libaries have bugs"thats not what I said, wtf?
Message permanent page
— Anyway, you are holding me up from workg
— No, that's what comes out from the discussion
— If you can't even agree on that, that you are living in your magical world of delusion and I won't try to get you of it :)
— The start key is what you provide as 'password' (and it can be passed as input of a key derivation function)
— It is exactly what you said
— /ban Srijan channel ad.
— Another one bites the dust...!Banned Srijan.Reason:channel ad.
— No! They do a statistical analysis on the access pattern on the precomputed lookup tables. Please _read_ the stuff you share and quote.