Re: A-B-a-b encryption

2003-11-17 Thread Jeremiah Rogers
On Nov 16, 2003, at 12:24 PM, lrk wrote: Stupid crypto, probably. Unless I'm missing something, this only works if A(A(M)) = M. Symetric crypto, not just symetric keys. NEVER willingly give the cryptanalyst the same message encrypted with the same system using two different keys. For the simple

Re: Are there...

2003-11-17 Thread l . crypto
(this is a resend, apologies for duplicates) As David Wagner points out, encryption with a public key (for which the private key has been discarded) would seem to work. I think there is a bit more to be said about requirements though. For a one-way encryption algorithm to be injective will also

Re: Clipper for luggage

2003-11-17 Thread David Chessler
At 03:00 PM 11/16/03, peter gutmann wrote: Bill Frantz [EMAIL PROTECTED] writes: I usually travel with zipper closed duffel bags. I fasten the zipper closed with a screw link. Anyone can unscrew the link and get into the bag, but it does effectively keep the zipper closed in transit. I suppose

Re: Are there...

2003-11-17 Thread Lawrence C. Stewart
As David Wagner points out, encryption with a public key (for which the private key has been discarded) would seem to work. I think there is a bit more to be said about requirements though. For a one-way encryption algorithm to be injective will also require that the output (nee ciphertext) be

Re: A-B-a-b encryption

2003-11-17 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Perry E.Metzger writes: Hmm. You need a cipher such that given B(A(M)) and A you can get B(M). I know of only one with that property -- XOR style stream ciphers. Unfortunately that makes for a big flaw, so I'm not sure we should throw out our Diffie-Hellman

Re: A-B-a-b encryption

2003-11-17 Thread David Wagner
martin f krafft wrote: it came up lately in a discussion, and I couldn't put a name to it: a means to use symmetric crypto without exchanging keys: - Alice encrypts M with key A and sends it to Bob - Bob encrypts A(M) with key B and sends it to Alice - Alice decrypts B(A(M)) with key A,

Re: XML-proof UIDs

2003-11-17 Thread Rich Salz
This is what GUIDs/UUIDs were designed for, and they're used broadly. They're standardized in ISO 11578 [1], although there's a very similar public description in an expired Internet Draft [2]. Microsoft also publishes a description of how they generate their GUIDs, but I can't find it right

Re: Are there...one-way encryption algorithms

2003-11-17 Thread Enzo Michelangeli
Amir and others, First, I'd like to thank all who have taken time to reply, either on- or off-list. All suggestions so far are related to public-key algorithms; I had myself thought about simply raising a generator g to the plaintext, or to a suitable injective function of the plaintext, in a