two points though
one, having to decrypt the whole message and then discover you need to flip the bit is wasteful of computation and time
two, it still doesn't fix the problem of two 3 key users with software imputing 2 keys
two points though
one, having to decrypt the whole message and then discover you need to flip the bit is wasteful of computation and time
two, it still doesn't fix the problem of two 3 key users with software imputing 2 keys
No replies yet.