[6726] in cryptography@c2.net mail archive
Re: A new PKC, and some conjectures
daemon@ATHENA.MIT.EDU (staym@accessdata.com)
Mon Mar 6 12:07:33 2000
From: staym@accessdata.com
Message-ID: <38C3E064.3D71@accessdata.com>
Date: Mon, 06 Mar 2000 09:44:20 -0700
MIME-Version: 1.0
To: bram <bram@gawth.com>
Cc: cypherpunks@cyberpass.net, cryptography@c2.net
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
You might want to look at Hall et al's Reaction Attacks,
http://www.counterpane.com/reaction_attacks.html
Basically, you take a valid message and tweak it to see where it becomes
invalid. Leave the seed value entirely alone, and just add powers of
two to one of the integers you send until it toggles and look at the
response to see when the ciphertext becomes invalid. A properly
constructed protocol can prevent this (see the paper).
--
Mike Stay
Programmer / Crypto guy
AccessData Corp.
staym@accessdata.com