question to crypto experts

Robert J. Hansen rjh at sixdemonbag.org
Sun Apr 26 03:39:16 CEST 2026


> ok, it's interesting, I wonder how they achieve it, but seems that it's 
> safe!
https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle

If you design the system from the ground up with the assumption the 
attacker gets to choose everything except the key, that's a very very 
strong design. Compared to that, the situation of "the attacker gets to 
know some of the plaintext" is nothing at all.

Or, put simply:

If you play the cryptosystem design game on hard mode, easy mode 
challenges like "resistant to known plaintext attacks" get overcome for 
free.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 236 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-devel/attachments/20260425/f1c6ea8d/attachment.sig>


More information about the Gnupg-devel mailing list