Describe the flaw in this argument:
Consider the following attack against one-time pad: upon seeing a ciphertext c, the eavesdropper tries every candidate key k = {0, 1} until she has found the one that was used, at which point she outputs the plaintext m. This contra dicts the argument in the book that the eavesdropper can obtain no information about m by seeing the ciphertext.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here