[Cryptography] Which big-name ciphers have been broken in living memory?

Alexandre Anzala-Yamajako anzalaya at gmail.com
Mon Aug 18 11:56:07 EDT 2014


Is this (http://research.microsoft.com/pubs/81673/strongake-submitted.pdf)
supposed to be considered atypical ?
The model described here models what you call forward secrecy (which is
rarely perfect).

Cheers




> The only real difficulty here is step 1.  If you don't want to use
> asymmetric crypto but are willing to accept simple DH, then this is
> simple.  Otherwise, I'm not sure how to accomplish it:  Typical work on key
> exchange protocols doesn't worry about retrospective attacks if the keys
> are later revealed.
>
>                                                         -- Jerry
>


-- 
Alexandre Anzala-Yamajako
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140818/6cb42d30/attachment.html>


More information about the cryptography mailing list