[Cryptography] Secret key agreement by public discussion from common information

Ben Laurie ben at links.org
Wed Mar 9 05:35:29 EST 2016


On 9 March 2016 at 04:14, Tony Arcieri <bascule at gmail.com> wrote:
> On Tue, Mar 8, 2016 at 6:42 AM, mok-kong shen <mok-kong.shen at t-online.de>
> wrote:
>>
>>    Eve deliberately injects noise into the system making it seem
>>    much noiser than it actually is, which Alice and Bob then
>>    derive their probabilistic models from, but when they start
>>    exchanging data, Eve removes the noise.
>
>
> That's not really an eavesdropping Eve though, that's more like a malicious
> Mallory the active attacker. In this model, Mallory could pretend to be Bob
> and also ask for clarifications from Alice, and Alice has no way to tell Bob
> from Mallory.

Bob can, though (IIRC this weakness is discussed in the paper).


More information about the cryptography mailing list