[14750] in cryptography@c2.net mail archive
A-B-a-b encryption
daemon@ATHENA.MIT.EDU (martin f krafft)
Sun Nov 16 06:08:57 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 14 Nov 2003 09:19:25 +0100
From: martin f krafft <madduck@madduck.net>
To: crypto list <cryptography@metzdowd.com>
Mail-Followup-To: crypto list <cryptography@metzdowd.com>
--xHFwDpU9dbj6ez1V
Content-Type: text/plain; charset=iso-8859-15
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
it came up lately in a discussion, and I couldn't put a name to it:
a means to use symmetric crypto without exchanging keys:
- Alice encrypts M with key A and sends it to Bob
- Bob encrypts A(M) with key B and sends it to Alice
- Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
- Bob decrypts B(M) with key B leaving him with M.
Are there algorithms for this already? What's the scheme called?
I searched Schneier (non-extensively) but couldn't find a reference.
Thanks,
--=20
martin; (greetings from the heart of the sun.)
\____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@madduck
=20
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
=20
time wounds all heels.
-- groucho marx
--xHFwDpU9dbj6ez1V
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD4DBQE/tJANIgvIgzMMSnURArXiAKDpdjDm9944mIkV5RwfqdWdDI8L2gCXZaNs
r011aKeSIbjzT+c7UrofBA==
=xW6a
-----END PGP SIGNATURE-----
--xHFwDpU9dbj6ez1V--
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com