[Cryptography] Secret key agreement by public discussion from common information

Tony Arcieri bascule at gmail.com
Tue Mar 8 23:14:05 EST 2016


On Tue, Mar 8, 2016 at 6:42 AM, mok-kong shen <mok-kong.shen at t-online.de>
wrote:

>    Eve deliberately injects noise into the system making it seem
>    much noiser than it actually is, which Alice and Bob then
>    derive their probabilistic models from, but when they start
>    exchanging data, Eve removes the noise.


That's not really an eavesdropping Eve though, that's more like a malicious
Mallory the active attacker. In this model, Mallory could pretend to be Bob
and also ask for clarifications from Alice, and Alice has no way to tell
Bob from Mallory.

-- 
Tony Arcieri
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20160308/bcca46de/attachment.html>


More information about the cryptography mailing list