Yeah. That even might be one of the matasano (now cryptopals) challenges. Like Mersenne twister.

A bit much for a "quiz" perhaps. This simple example at least disabuses people of the mistaken belief that it's only nonce *reuse* that's dangerous (although, who that is helping I could not tell you 😁).

Reply to this note

Please Login to reply.

Discussion

This simple quiz really helped me clear up some still-fresh concepts I’ve been studying, so thank you both. More #cryptostr is welcome in my feed :)

Been wondering about this harder version. If it’s simple to state or link, would appreciate it.

I have a vague sense that n+1 txns using a polynomial would likely leak a key, but can’t see how a complex permutation of the scalar field could be cracked without knowing some properties about it. Quick google didn’t yield any results