Re: A Method of Session Key Generation

New Message Reply About this list Date view Thread view Subject view Author view

Mok-Kong Shen (mok-kong.shen@stud.uni-muenchen.de)
Thu, 28 Jan 1999 20:15:00 +0100


Jim Gillogly wrote:
>
>
> As with most security proposals, the efficacy depends largely on
> the threat model. For example, if you assume the enemy has access
> (perhaps delayed) to previous plaintexts (or their hash), then
> access to future plaintext depends only on the master key. Modern
> ciphers should be impervious to known plaintext attacks.

Thank you for the comments.

Yes. If the analyst has all the previous plaintexts, then there
is a problem. However, the masterkey is only applied to the
hash values which are short. Hence the inference of the masterkey
should not be easy (he must somehow obtained a large number of
session keys for doing that). Further, the master key need not
be constant but vary according to some schedule. Perhaps I should
say that the goal is to get a session key and send the message
rightaway. Maybe the scheme could be improved, though I have no idea
at the moment. Hints would be highly appreciated.

M. K. Shen


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:18:06