[14750] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

A-B-a-b encryption

daemon@ATHENA.MIT.EDU (martin f krafft)
Sun Nov 16 06:08:57 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 14 Nov 2003 09:19:25 +0100
From: martin f krafft <madduck@madduck.net>
To: crypto list <cryptography@metzdowd.com>
Mail-Followup-To: crypto list <cryptography@metzdowd.com>


--xHFwDpU9dbj6ez1V
Content-Type: text/plain; charset=iso-8859-15
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

it came up lately in a discussion, and I couldn't put a name to it:
a means to use symmetric crypto without exchanging keys:

  - Alice encrypts M with key A and sends it to Bob
  - Bob encrypts A(M) with key B and sends it to Alice
  - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
  - Bob decrypts B(M) with key B leaving him with M.

Are there algorithms for this already? What's the scheme called?
I searched Schneier (non-extensively) but couldn't find a reference.

Thanks,

--=20
martin;              (greetings from the heart of the sun.)
  \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@madduck
=20
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
=20
time wounds all heels.
                                                       -- groucho marx

--xHFwDpU9dbj6ez1V
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD4DBQE/tJANIgvIgzMMSnURArXiAKDpdjDm9944mIkV5RwfqdWdDI8L2gCXZaNs
r011aKeSIbjzT+c7UrofBA==
=xW6a
-----END PGP SIGNATURE-----

--xHFwDpU9dbj6ez1V--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post