very short plaintexts symmetrically encrypted
Werner Koch
wk at gnupg.org
Tue Jan 12 09:35:17 CET 2010
On Mon, 11 Jan 2010 13:06:03 -0500, lists.gnupg-users at mephisto.fastmail.net wrote:
> Forgive me, but how is a MitM attack possible against a symmetric cypher
> using a shared, secret key?
For example by swapping messages. Two messages are sent on two
out-of-band events one which says Yes and the other says No. If you
can mount an active MitM attack you can revert the meaning. A MitM
may also inject faults to make the received message look like a
transmission error and thereby triggering another message.
Right, you can counter such attacks by adding more information to the
message. However, the original post was about two short messages.
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
More information about the Gnupg-users
mailing list