[Cryptography] Non-Authenticated Key Agreement

Davy Durham ddurham at davyandbeth.com
Wed Sep 23 23:36:23 EDT 2015


On 09/23/2015 05:07 AM, Miroslav Kratochvil wrote:
>
> If I am not wrong, you need to look at what happens when the attacker 
> XORs all the messages transferred. Cummulatively, it gets as simple as
>
> d1 xor d2 xor d3 = (d.a).(d.a.b).(d.b) = d
>

Yep.  Thanks [all you] guys. I knew I was probably missing something.  
None of my offline friends caught it either.  :)



More information about the cryptography mailing list