[14758] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A-B-a-b encryption

daemon@ATHENA.MIT.EDU (lrk)
Sun Nov 16 17:37:56 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sun, 16 Nov 2003 11:24:02 -0600
From: lrk <crypto@ovillatx.sytes.net>
To: martin f krafft <madduck@madduck.net>
Cc: cryptography@metzdowd.com
In-Reply-To: <20031114081925.GA11764@piper.madduck.net>

On Fri, Nov 14, 2003 at 09:19:25AM +0100, martin f krafft wrote:
> it came up lately in a discussion, and I couldn't put a name to it:
> a means to use symmetric crypto without exchanging keys:
> 
>   - Alice encrypts M with key A and sends it to Bob
>   - Bob encrypts A(M) with key B and sends it to Alice
>   - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
>   - Bob decrypts B(M) with key B leaving him with M.
> 
> Are there algorithms for this already? What's the scheme called?

"Stupid crypto", probably. Unless I'm missing something, this only works
if A(A(M)) = M. Symetric crypto, not just symetric keys.

NEVER willingly give the cryptanalyst the same message encrypted with
the same system using two different keys.

For the simple case, suppose F(X) = X ^ S (exclusive or with a string
generated from the key).

Then  M = A(M) ^ B(M) ^ B(A(M)), right?

Probably something similar for other symetric systems.


--
crypto@ovillatx.sytes.net

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post