>> |
Anonymous
>>329026 you can see an example here: http://www.heise.de/security/Verschusselt-statt-verschluesselt--/artikel/103093
You take the numbers a, b, c, d, e, f, ... and plot them in 3D as (a-b, b-c, c-d), (b-c, c-d, d-e), (c-d, d-e, e-f) ... that way you can see relations between following numbers. The first diagram shows true random numbers, a nice cloud without structure. The second shows the data on the "128-bit AES Hardware encrypted" disk. While it should look like the first, the data groups in 4 regions --> very weak encryption, extremely sloppy implementation. Don't buy!
|