[6726] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A new PKC, and some conjectures

daemon@ATHENA.MIT.EDU (staym@accessdata.com)
Mon Mar 6 12:07:33 2000

From: staym@accessdata.com
Message-ID: <38C3E064.3D71@accessdata.com>
Date: Mon, 06 Mar 2000 09:44:20 -0700
MIME-Version: 1.0
To: bram <bram@gawth.com>
Cc: cypherpunks@cyberpass.net, cryptography@c2.net
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

You might want to look at Hall et al's Reaction Attacks,
http://www.counterpane.com/reaction_attacks.html

Basically, you take a valid message and tweak it to see where it becomes
invalid.  Leave the seed value entirely alone, and just add powers of
two to one of the integers you send until it toggles and look at the
response to see when the ciphertext becomes invalid.  A properly
constructed protocol can prevent this (see the paper).
-- 
Mike Stay
Programmer / Crypto guy
AccessData Corp.
staym@accessdata.com


home help back first fref pref prev next nref lref last post