Re: Chaffing and Winnowing

New Message Reply About this list Date view Thread view Subject view Author view

Enzo Michelangeli (em@who.net)
Thu, 4 Feb 1999 08:38:02 +0800


Well, the crypto-police could argue that this is equivalent to using k-bit
conventional encryption (the k bits being a sort of "key"). Besides, are we
sure that all-or-nothing transforms are unencumbered?

Enzo

-----Original Message-----
From: Jim Gillogly <jim@acm.org>
To: CodherPlunks@toad.com <CodherPlunks@toad.com>
Date: Thursday, February 04, 1999 5:49 AM
Subject: Re: Chaffing and Winnowing

>Anonymous writes:
>> Very interesting idea!
>>
>> Would the same thing work for RSA encryption without any symmetric keys?
>> Send N-k bits of the transformed message in the clear, and the remaining
>> k bits RSA encrypted.
>
>Yes, that should work fine. Just make sure k >= 128 (or whatever level
>of protection is desired) and use appropriate padding. If the
all-or-nothing
>transform is fast enough (and secure, of course), it should be a lot faster
>than doing RSA on the whole thing. Let's patent it: "Gillogly & Anonymous
>1999"... just in time for the RSA going-away party. Shall we cut Ron in
for
>a piece of the action? :)
>
>--
> Jim Gillogly
> 13 Solmath S.R. 1999, 20:12
> 12.19.5.16.8, 2 Lamat 1 Pax, Fourth Lord of Night
>
>


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:18:25