This is due to some of the main reasons for cryptography:
- Make sure the message is not changed in the path (Continuous)
- Make sure the message is not read in the path (Secure)
- Make sure the message is written from the user (Authentic)
- Make sure the message does not match the message previously reported (No Replay)
- etc.
Here you need to add a few things to make sure this is true. One important thing is random value.
For example, if I encrypt “Too many secrets” with a key, it may exit with “dWua3hTOeVzO2d9w”
There are two problems: an attacker can easily break encryption, since I use a very limited set of characters. Also, if I send the same message again, it will look exactly the same. Finally, the attacker can record it and send the message again, and the recipient will not know that I did not send it, even if the attacker did not violate it.
If I add some kind of random garbage to the string every time I encrypt it, this not only complicates the hacking process, but the encrypted message is different every time.
Other features of cryptography in the above brands are fixed using other means than randomness (initial values, two-way authentication, etc.), but randomness takes care of several problems and helps in solving other problems.
A bad source of randomness again limits the character set, so it is easier to break, and if it is easy to guess or otherwise limit it, then the attacker has fewer ways to try and make a brute force attack.
-Adam
Adam davis
source share