[Cryptography] Hohha quantum resistant end-to-end encryption protocol draft
Peter Fairbrother
peter at tsto.co.uk
Thu Nov 15 15:00:11 EST 2018
On 15/11/18 13:10, Ismail Kizir wrote:
> Hohha Protocol is a quantum safe communication protocol.
> This is the techinal whitepaper draft of our Hohha Messenger which
> we'll publish soon with a MIT Licence.
> Any contribution and or comment will be appreciated.
> Link is a sharable link of a Google Docs document.
>
> https://lnkd.in/gpPXW8n
Just had a quick look. It's a bit of a hodge-podge, isn't it. But
there's worse:
1] The key renewal is worse than useless. If an existing key is not
known to Alice, there is no reason to renew it - if it is known to
Alice, she can deduce the new key. So it's useless.
It's worse than useless because it introduces complexity and attack
surface. KISS. I don't know of an attack on that part of the protocol
offhand, but why take the chance?
2] It uses an untested ?proprietary? roll-your-own algorithm. Ouch. Why
not use something tested? Why allow an untested option, even as an option?
3] it can be forced back into using quantum-insecure DH. Ouch. Mallory
will have fun...
4] it places too high a burden on the user. Users are clueless about
security, that's our job, not theirs.
5] it relies on a trusted server.
So overall, it's a hodge-podge piece of cr#p, written by someone with no
clue about protocol design.
Sorry about that. Nothing personal.
-- Peter Fairbrother.
More information about the cryptography
mailing list