[14960] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Super-Encryption

daemon@ATHENA.MIT.EDU (mlong@bridgetonconsulting.com)
Thu Dec 18 12:01:32 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 16 Dec 2003 13:18:15 -0500
From: "" <mlong@bridgetonconsulting.com>
To: Ben Laurie <ben@algroup.co.uk>
Cc: "" <cryptography@metzdowd.com>
In-Reply-To: <3FDF52AB.8000102@algroup.co.uk>

Quoting Ben Laurie <ben@algroup.co.uk>:

 
> Yes, but you could know all this from cipher2 and RSA of SHA1(message), 
> so I still don't see what value is added by cipher1.

Without cipher1, implying (iv1, RSA(SHA1(message) || key1)) it is impossible 
to determine the originator of the message. Remember, I'm thinking in terms of 
XML-ENC where cipher1 is represented by 
<enc:EncryptedData>
..
</enc:EncryptedData>
and these scoping elements will be encrypted to the cipher2 result which is 
represented by another <enc:EncryptedData> and friends.

Thx,

-Matt

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post