Symmetric alternative to public-key crypto for key-exchange?
Date: 29 Aug 2005 22:10:37 -0700
I remember seeing a note somewhere to the effect that a symmetric
cipher could be used for key exchange instead of a public key one, as
1) Bob encrypts the key to be exchanged with his key and sends it to
2) Alice encrypts this message with her key and sends it back to Bob
3) Bob decrypts this message with his key, and sends it back to Alice
4) Alice decrypts the message, revealing the key
This requires a couple of properties from the symmetric cipher used: It
must be true that D(b, D(a, E(b, E(a, message)))) = message, and it
must not be possible to recover the key given the intermediate messages
transmitted between Alice and Bob (for example, with a standard stream
cipher, XORing subsequent messages would reveal both Alice and Bob's
keystreams, and hence the original message).
My question is this: is anyone familiar with a cipher that meets these
- Re: =?windows-1252?Q?Theory_of_Eve=92s_Triangle_Enigma_=96_Adacrypt?=
... Only Alice and Bob know this side however and she is ... the better way of implementing the triangle model. ... One side of the triangle is the cipher text vector, ... Alice and Bob believe that the traditional number line of arbitrary ...
- =?windows-1252?Q?Server_and_Client_Analogy_=96_The_New_Cryptography_M?= =?windows-1252?Q?ode
... Alice writes an encryption program first of all. ... In future she will communicate with Bob by ... if the cipher text of different messages are illegally intercepted by ... cryptography is still very intellectually challenging in that Alice ...
- Re: A Dedicated Non-Repudiation Cipher
... he can receive ciphertext from Alice that he can decrypt but he cannot ... generate return ciphertext that Alice can decrypt or indeed any cipher ... By adacrypt's definition of his "mutual database technology", ... There's the "Bob sent the message to himself" defense. ...
- Re: Symmetric alternative to public-key crypto for key-exchange?
... > cipher could be used for key exchange instead of a public key one, ... > 2) Alice encrypts this message with her key and sends it back to Bob ... > This requires a couple of properties from the symmetric cipher used: ...
- Re: Mutual Database Technology.
... A cipher is selected (sometimes externally, ... Alice and Bob communicate, encrypting their messages with the agreed ...