[Cryptography] End-to-End, One-to-Many, Encryption Question

Kent Borg kentborg at borg.org
Fri Jun 13 18:19:51 EDT 2014


On 06/13/2014 04:18 PM, Jonathan Katz wrote:
> Second, vulnerability to a meet-in-the-middle attack just means that 
> the algorithm does not achieve security equal to its bit-length; it 
> does not mean the algorithm is not secure. (Note that public-key 
> algorithms do not achieve security equal to their bit-length either...)

But the crypto world eschews algorithms that are a group. So how would 
one land upon an algorithm that is secure *but* for the 
feature/misfeature of being a group?

But if no one is working out the other kinks that will be there. Picking 
one turns into something close to designing ones own crypto, doesn't it? 
Any recommendations?

-kb, the Kent who reminds himself that not encrypting and trusting the 
cloud is somewhat fewer effective bits.



More information about the cryptography mailing list