Re: Are there...one-way encryption algorithms

2003-11-21 Thread David Wagner
Anton Stiglic wrote: David Wagner [EMAIL PROTECTED] wrote: martin f krafft wrote: - Bob encrypts A(M) with key B and sends it to Alice - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob - Bob decrypts B(M) with key B leaving him with M. Are there algorithms for this

Re: Are there...one-way encryption algorithms

2003-11-20 Thread Bodo Moeller
On Tue, Nov 18, 2003 at 09:19:48AM -0800, Anton Stiglic wrote: David Wagner [EMAIL PROTECTED]: martin f krafft wrote: it came up lately in a discussion, and I couldn't put a name to it: a means to use symmetric crypto without exchanging keys: - Alice encrypts M with key A and sends it to

Re: Are there...one-way encryption algorithms

2003-11-19 Thread Sidney Markowitz
Enzo Michelangeli wrote: but the slight risk of collision, although practically negligible, is a bit irksome If you quantify the practically negligible risk, it might be less irksome: SHA-1 is a 160 bit hash. The birthday paradox says that you would need to hash 2^80 different credit card

Re: Are there...one-way encryption algorithms

2003-11-19 Thread Anton Stiglic
David Wagner [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] martin f krafft wrote: it came up lately in a discussion, and I couldn't put a name to it: a means to use symmetric crypto without exchanging keys: - Alice encrypts M with key A and sends it to Bob - Bob encrypts

Re: Are there...one-way encryption algorithms

2003-11-17 Thread Enzo Michelangeli
if something better can be done. Enzo - Original Message - From: Amir Herzberg [EMAIL PROTECTED] To: 'Enzo Michelangeli' [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Sunday, November 16, 2003 10:44 PM Subject: RE: Are there...one-way encryption algorithms Enzo asked, Are there one-way

RE: Are there...one-way encryption algorithms

2003-11-16 Thread Amir Herzberg
Enzo asked, Are there one-way encryption algorithms guaranteed to be injective (i.e., deterministically collision-free)? Or are there theoretical reasons against their existence? I'm looking for algorithms where every piece of code and data is public, thus excluding conventional