[Cryptography] Which big-name ciphers have been broken in living memory?
Alexandre Anzala-Yamajako
anzalaya at gmail.com
Mon Aug 18 11:56:07 EDT 2014
Is this (http://research.microsoft.com/pubs/81673/strongake-submitted.pdf)
supposed to be considered atypical ?
The model described here models what you call forward secrecy (which is
rarely perfect).
Cheers
> The only real difficulty here is step 1. If you don't want to use
> asymmetric crypto but are willing to accept simple DH, then this is
> simple. Otherwise, I'm not sure how to accomplish it: Typical work on key
> exchange protocols doesn't worry about retrospective attacks if the keys
> are later revealed.
>
> -- Jerry
>
--
Alexandre Anzala-Yamajako
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140818/6cb42d30/attachment.html>
More information about the cryptography
mailing list