[14964] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Super-Encryption

daemon@ATHENA.MIT.EDU (Ben Laurie)
Thu Dec 18 12:05:50 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 17 Dec 2003 10:20:55 +0000
From: Ben Laurie <ben@algroup.co.uk>
To: mlong@bridgetonconsulting.com
Cc: cryptography@metzdowd.com
In-Reply-To: <1071598695.3fdf4c6708767@66.150.199.3>

mlong@bridgetonconsulting.com wrote:

> Quoting Ben Laurie <ben@algroup.co.uk>:
> 
>  
> 
>>Yes, but you could know all this from cipher2 and RSA of SHA1(message), 
>>so I still don't see what value is added by cipher1.
> 
> 
> Without cipher1, implying (iv1, RSA(SHA1(message) || key1)) it is impossible 
> to determine the originator of the message.

Eh? If you have RSA(SHA1(message)) then decrypting that and checking the 
hash matches confirms the originator.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post