Come for the quick hacks, stay for the epiphanies. | |
PerlMonks |
Re^3: Encryption using perl core functions onlyby Porculus (Hermit) |
on Nov 26, 2007 at 22:15 UTC ( [id://653107]=note: print w/replies, xml ) | Need Help?? |
It's not that simple, unfortunately. If you re-use the key, then you lose that security (the hacker can simply think of a large number of messages as a single large message with a key shorter than the message, at which point you're back where you started); and if you don't re-use the key, you have the problem of getting the new key to the client device securely.
In Section
Seekers of Perl Wisdom
|
|