[Cryptography] End-to-End, One-to-Many, Encryption Question
Kent Borg
kentborg at borg.org
Fri Jun 13 18:19:51 EDT 2014
On 06/13/2014 04:18 PM, Jonathan Katz wrote:
> Second, vulnerability to a meet-in-the-middle attack just means that
> the algorithm does not achieve security equal to its bit-length; it
> does not mean the algorithm is not secure. (Note that public-key
> algorithms do not achieve security equal to their bit-length either...)
But the crypto world eschews algorithms that are a group. So how would
one land upon an algorithm that is secure *but* for the
feature/misfeature of being a group?
But if no one is working out the other kinks that will be there. Picking
one turns into something close to designing ones own crypto, doesn't it?
Any recommendations?
-kb, the Kent who reminds himself that not encrypting and trusting the
cloud is somewhat fewer effective bits.
More information about the cryptography
mailing list