[14793] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Are there...one-way encryption algorithms

daemon@ATHENA.MIT.EDU (David Wagner)
Fri Nov 21 14:05:57 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: cryptography@metzdowd.com
From: daw@taverner.cs.berkeley.edu (David Wagner)
Date: Thu, 20 Nov 2003 23:30:53 +0000 (UTC)
Reply-To: daw-usenet@taverner.cs.berkeley.edu (David Wagner)
X-Complaints-To: usenet@abraham.cs.berkeley.edu

Anton Stiglic wrote:
>"David Wagner" <daw@taverner.cs.berkeley.edu> wrote:
>> martin f krafft  wrote:
>> >  - Bob encrypts A(M) with key B and sends it to Alice
>> >  - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
>> >  - Bob decrypts B(M) with key B leaving him with M.
>> >
>> >Are there algorithms for this already? What's the scheme called?
>>
>> It's called Pollig-Hellman.
>
>If I'm not mistaken you are wrong.

You're right.  The above protocol is essentially Shamir's 3-pass
protocol, not Pohlig-Hellman.

Pohlig-Hellman is the encryption scheme A(M) = M^A mod p.  If you
instantiate Krafft's proposal with the Pohlig-Hellman encryption scheme,
you get a working (and secure) instance of Shamir's 3-pass protocol.

Thank you for correcting my error!

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post