Cipher for Android
Just one thing. Why does the app always decode a message, created with current key file no matter what key position was set. It should decode only if the right position was set as key. Now it decodes the message every time.
This is a great app but it needs to be able to generate keyfiles of identical size to the actual message typed. What I mean is: If the message is 30KB in size, then the keyfile should 30KB in size. Any keyfile larger then the message itself just wastes space. Since as far as what I can see, 1.00MB is the smallest keysize. This means that even if you have a 900KB message, that still is 100KB of wasted space. Thanks for the reply, The reason for this was also because the whole concept of the One-Time Pad relies on the fact that both the message and the key are the same size. This creates a Ciphertext of the same size too. Because of the fact that message, key, and ciphertext are the same size, no form of cryptanalysis can be used on the message apart from blind brute force.
This is a great app but it needs to be able to generate keyfiles of identical size to the actual message typed. What I mean is: If the message is 30KB in size, then the keyfile should 30KB in size. Any keyfile larger then the message itself just wastes space. Since as far as what I can see, 1.00MB is the smallest keysize. This means that even if you have a 900KB message, that still is 100KB of wasted space. Thanks for the reply, The reason for this was also because the whole concept of the One-Time Pad relies on the fact that both the message and the key are the same size. This creates a Ciphertext of the same size too. Because of the fact that message, key, and ciphertext are the same size, no form of cryptanalysis can be used on the message apart from blind brute force.
by V####:
Excellent app, but hasn't been updated for a while, is it because there isn't any need, or because its been neglected?