[Cryptography] Terakey, An Encryption Method Whose Security Can Be Analyzed from First Principles

Peter Fairbrother peter at tsto.co.uk
Mon Aug 24 23:21:31 EDT 2020


On 07/08/2020 20:06, Arnold Reinhold via cryptography wrote:

> What you are proposing are active attacks. The security model I used in 
> my paper[1] for what I claim is a first-principles proof of 
> confidentially is based on a passive attack. 

"A" (singular) passive attack. I won't get into that.

But you don't have to defend against "a passive attack" - at a minimum 
you have to defend against all _plausible_ attacks, whether passive or 
active; or better, defend against all *possible* attacks.



Now suppose you deploy a system which defends against passive attacks 
only. Is it certain - certain - that it will never be used in a 
situation where an active attack is possible?

If you answer yes, at a minimum you abuse the dictum that a US Marine 
can break anything.


Analysing your cryptosystem from first principles? - I guess it is 
analysable: it is broken.


Peter Fairbrother


More information about the cryptography mailing list