[Cryptography] Non-Authenticated Key Agreement
Davy Durham
ddurham at davyandbeth.com
Wed Sep 23 23:36:23 EDT 2015
On 09/23/2015 05:07 AM, Miroslav Kratochvil wrote:
>
> If I am not wrong, you need to look at what happens when the attacker
> XORs all the messages transferred. Cummulatively, it gets as simple as
>
> d1 xor d2 xor d3 = (d.a).(d.a.b).(d.b) = d
>
Yep. Thanks [all you] guys. I knew I was probably missing something.
None of my offline friends caught it either. :)
More information about the cryptography
mailing list