<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">On 12/12/24 05:15, Werner Koch wrote:<br>
</div>
<blockquote type="cite" cite="mid:87msh1w3t4.fsf@jacob.g10code.de">
<pre class="moz-quote-pre" wrap="">On Wed, 11 Dec 2024 22:39, Jacob Bachmeyer said:
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">The problem is that strong algorithms *become* weak without advance
warning. Therefore, it is necessary to take measures to reduce the
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap="">
But we don't know in which way they become weak. You can't exclude that
a new weakness is leveraged by the extra random salt [1]</pre>
</blockquote>
<p>So that would make adding salted signatures neutral: they
protect against one class of unknown attacks but could also enable
another class of unknown attacks.<span
style="white-space: pre-wrap">
</span></p>
<blockquote type="cite" cite="mid:87msh1w3t4.fsf@jacob.g10code.de">
<pre class="moz-quote-pre" wrap="">[...]
[1] We are talking about a salt and not a nonce (number-used-once).
</pre>
</blockquote>
<p>Now I have to ask: how is a salt different from a nonce?</p>
<p><br>
</p>
<p>-- Jacob<br>
</p>
<p><br>
</p>
</body>
</html>