On Wed, Sep 05, 2001 at 11:48:23AM -0700, Scott Miller wrote:
> ElGamal, the current P/K encryption in .4 has some weaknesses with
> chosen-ciphertext attacks that make breaking ElGamal easier than
> breaking the underlying discrete logarithm problem.
> 
> For that reason I've written a replacement algorithm, DLES, described in
> the paper "DHAES: An Encryption Scheme Based on the Diffie-Hellman
> Problem", (1998) by Abdalla, Bellare, Rogaway.  
> 
> The algorithm has about the same performance as ElGamal (2 modexps for
> encrypt, 1 to decrypt), but provides much stronger security guarantees.
> In addition, the algorithm involves a keyed message authentication code,
> for which we'll be using HMAC.  The mac lets Bob know if the encrypted
> quantity will actually decrypt to valid data and not gibberish.  For
> this reason, we would be able to eliminate the 0x00000000 we encrypt at
> the beginning of a restart request, which would eliminate a possible
> partial known-plaintext attack.  

When are the macs sent?

> Comments?

How do you want to phase this in?

Also, a while back you mentioned an issue with the ElGamal block size.
Does the new algorithm solve or otherwise obviate this?

-- 

:: tavin cole (tcole at espnow.com) ::

"I can hear them in the dark sharpening their lasers."
                                    - Erwin Chargaff


_______________________________________________
Devl mailing list
Devl at freenetproject.org
http://lists.freenetproject.org/mailman/listinfo/devl

Reply via email to