You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
From the one-time pad cipher scheme, we learn, that if the ciphertext shall provide no information on the message, than the random secret must be of the same size (entropy) like the message.
We increase the secret (key) lengths to make signing more robust in face of brute force attacks and I think also the random secret should be as large as the key in order to safeguard from this kind of attacks.
Ok, makes sense. Thank you for the explanation!
I really do not have any good source for that formula, just reused one from someone else's implementation.
Hello!
Don't you have to use here
2**n
instead of n?All the best,
Robert
The text was updated successfully, but these errors were encountered: