[18795] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [smb@cs.columbia.edu: Skype security evaluation]

daemon@ATHENA.MIT.EDU (cyphrpunk)
Mon Oct 31 09:43:53 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 27 Oct 2005 21:07:21 -0700
From: cyphrpunk <cyphrpunk@gmail.com>
To: cypherpunks@jfet.org, cryptography@metzdowd.com
In-Reply-To: <20051026074451.L35119@skutsje.san.webweaving.org>

Wasn't there a rumor last year that Skype didn't do any encryption
padding, it just did a straight exponentiation of the plaintext?

Would that be safe, if as the report suggests, the data being
encrypted is 128 random bits (and assuming the encryption exponent is
considerably bigger than 3)? Seems like it's probably OK. A bit risky
perhaps to ride bareback like that but I don't see anything inherently
fatal.

CP

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post