- ECS - 9 Updates
"Chris M. Thomasson" <invalid_chris_thomasson@invalid.invalid>: Aug 12 12:32AM -0700 On 8/8/2018 1:34 PM, Rick C. Hodgin wrote: > Separate issue, and one rooted in hardware and infrastructure that may > be outside of my control. Very little you can do about that. You can > only encrypt and work with your payload, not the delivery system. The encryption can sort of, override the delivery system in a sense. If Bob II cannot recreate the same hashes, then he knows something is not Kosher with the payload, or ciphertext if you will. |
"Chris M. Thomasson" <invalid_chris_thomasson@invalid.invalid>: Aug 12 12:42AM -0700 On 8/12/2018 12:32 AM, Chris M. Thomasson wrote: > The encryption can sort of, override the delivery system in a sense. If > Bob II cannot recreate the same hashes, then he knows something is not > Kosher with the payload, or ciphertext if you will. Actually, there is a way to make bit level sensitivity down to the ciphertext level, HMAC or any MAC aside for a moment. Change one bit in the ciphertext, and the decrypted result is radically different than the original plaintext. Fwiw, the algorithm can be found here... http://funwithfractals.atspace.cc/ct_cipher |
"Rick C. Hodgin" <rick.c.hodgin@gmail.com>: Aug 12 12:21PM -0400 On 08/12/2018 03:32 AM, Chris M. Thomasson wrote: >> be outside of my control. Very little you can do about that. You can >> only encrypt and work with your payload, not the delivery system. > The encryption can sort of, override the delivery system in a sense. You have to be able to have something like our existing RSA or Diffie-Hellman exchange, then you can send something they can use to encrypt, and send back, etc., then you can have secure connections in both directions regardless of the man in the middle. That's already well-established. By delivery system I mean the physical layer, meaning you cannot control if something makes it there or not. That's technology outside of your control. But, you should be able to detect if there is something invalid because the decrypting won't work as it should. > If > Bob II cannot recreate the same hashes, then he knows something is not > Kosher with the payload, or ciphertext if you will. Bob II? Bob who? :-) -- Rick C. Hodgin |
Mr Flibble <flibbleREMOVETHISBIT@i42.co.uk>: Aug 12 06:54PM +0100 On 12/08/2018 17:21, Rick C. Hodgin wrote: > outside of your control. But, you should be able to detect if > there is something invalid because the decrypting won't work as > it should. And Satan invented fossils yes? /Flibble -- "Suppose it's all true, and you walk up to the pearly gates, and are confronted by God," Bryne asked on his show The Meaning of Life. "What will Stephen Fry say to him, her, or it?" "I'd say, bone cancer in children? What's that about?" Fry replied. "How dare you? How dare you create a world to which there is such misery that is not our fault. It's not right, it's utterly, utterly evil." "Why should I respect a capricious, mean-minded, stupid God who creates a world that is so full of injustice and pain. That's what I would say." |
"Chris M. Thomasson" <invalid_chris_thomasson@invalid.invalid>: Aug 12 02:33PM -0700 On 8/12/2018 9:21 AM, Rick C. Hodgin wrote: > Diffie-Hellman exchange, then you can send something they can use > to encrypt, and send back, etc., then you can have secure connections > in both directions regardless of the man in the middle. Be careful: https://weakdh.org >> Bob II cannot recreate the same hashes, then he knows something is not >> Kosher with the payload, or ciphertext if you will. > Bob II? Bob who? :-) It is an ongoing thing over in sci.crypt. Bob I already died because of a man in the middle attack. Now, Bob II took his place. We want to keep him alive. Bob I was directed to go to a certain area where he got beaten up really bad, and finally murdered. Alice was nowhere in sight. |
"Chris M. Thomasson" <invalid_chris_thomasson@invalid.invalid>: Aug 12 02:35PM -0700 On 8/12/2018 2:33 PM, Chris M. Thomasson wrote: >> Bob II? Bob who? :-) > It is an ongoing thing over in sci.crypt. Bob I already died because of > a man in the middle attack. Actually, iirc it was a mixture of a chosen plaintext and man in the middle attacks. |
"Öö Tiib" <ootiib@hot.ee>: Aug 12 02:36PM -0700 On Sunday, 12 August 2018 20:54:49 UTC+3, Mr Flibble wrote: > > there is something invalid because the decrypting won't work as > > it should. > And Satan invented fossils yes? Leigh, why you troll Rick with those irrelevant questions? Satan, fossils, sediments and flood are not related to cryptography nor topical here and you anyway won't read his answer to that. |
"Chris M. Thomasson" <invalid_chris_thomasson@invalid.invalid>: Aug 12 03:45PM -0700 On 8/12/2018 2:35 PM, Chris M. Thomasson wrote: >> of a man in the middle attack. > Actually, iirc it was a mixture of a chosen plaintext and man in the > middle attacks. Just a lesson... If your crypto is garbage, then chosen plaintext can get at the key, and man in the middle can alter at will... |
"Rick C. Hodgin" <rick.c.hodgin@gmail.com>: Aug 12 07:18PM -0400 On 08/12/2018 05:36 PM, Öö Tiib wrote: > Leigh, why you troll Rick with those irrelevant questions? Satan, > fossils, sediments and flood are not related to cryptography nor > topical here and you anyway won't read his answer to that. Don't worry, Öö Tiib ... I'm done trying to communicate with Leigh. He has demonstrated a desire for mocking only. God will give it to Him as he requests. He will receive his due from the Lord on the day of judgment, and I am free from his blood being on my hands. -- Rick C. Hodgin |
You received this digest because you're subscribed to updates for this group. You can change your settings on the group membership page. To unsubscribe from this group and stop receiving emails from it send an email to comp.lang.c+++unsubscribe@googlegroups.com. |
No comments:
Post a Comment