simultaneous symmetric and public key encryption ?

David Shaw dshaw@jabberwocky.com
Thu Dec 19 18:44:02 2002


On Thu, Dec 19, 2002 at 04:34:56PM +0100, Per Tunedal wrote:
> I supposed it would be some help to Mallory to possess the plaintext when 
> attacking the encrypted text. Cf the Rosette stone used for "deciphering" 
> the hieroglyphs ...

Not really.  Modern ciphers are pretty resistant to chosen plaintext
attacks.

> 3a. Mallory gets the symmetric message key by attacking the message with 
> some help from the plain text.
> 
> 3b. Mallory attacks the encrypted session key with some help from the plain 
> session key.
> 
> 3c. Mallory gets the secret key used for encrypting the session key.

b and especially c, do not follow a.

David

-- 
   David Shaw  |  dshaw@jabberwocky.com  |  WWW http://www.jabberwocky.com/
+---------------------------------------------------------------------------+
   "There are two major products that come out of Berkeley: LSD and UNIX.
      We don't believe this to be a coincidence." - Jeremy S. Anderson