[19443] in cryptography@c2.net mail archive
Re: another feature RNGs could provide
daemon@ATHENA.MIT.EDU (David Malone)
Tue Dec 27 19:08:39 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 27 Dec 2005 22:18:53 +0000
From: David Malone <dwmalone@maths.tcd.ie>
To: Ben Laurie <ben@algroup.co.uk>
Cc: "Travis H." <solinym@gmail.com>,
"Perry E. Metzger" <perry@piermont.com>, cryptography@metzdowd.com
In-Reply-To: <43AFE759.9000409@algroup.co.uk>
On Mon, Dec 26, 2005 at 12:51:37PM +0000, Ben Laurie wrote:
> > The other day I was thinking of using a very large key to select a
> > permutation at random from the symmetric group S_(2^x). That would be
> > a group, but I don't see how you knowing that I'm using a random
> > permutation would help you at all.
> Surely if you do this, then there's a meet-in-the middle attack: for a
> plaintext/ciphertext pair, P, C, I choose random keys to encrypt P and
> decrypt C. If E_A(P)=D_B(C), then your key was A.B, which reduces the
> strength of your cipher from 2^x to 2^(x/2)?
S_n has size n!, so the size of the keyspace is (2^x)!. The thing
is that if you compose two of these the resulting key space is of
size (2^x)!, because you've already got all possible permutations,
so you gain nothing from it.
Usually a cypher is a small subset of the set of all possible
permutations, so composing the permutations may result in a bigger
subset. If the subset turns out to be a subgroup, then you gain
nothing, because a subgroup would be closed under composition.
In the case of having a plaintext/cyphertext pair in a cypher where
the key can be any possible permutation, knowing E(P) = C tells you
nothing except D(C) = P and E(X) != C for X != P, because the image
of one element tells you nothing about the others.
David.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com