Sujet : Re: HMAC cipher and a TRNG...
De : chris.m.thomasson.1 (at) *nospam* gmail.com (Chris M. Thomasson)
Groupes : sci.cryptDate : 08. Jul 2024, 06:34:06
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <v6ftof$od4m$1@dont-email.me>
References : 1 2 3 4 5 6
User-Agent : Mozilla Thunderbird
On 7/7/2024 8:10 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
A compromised secret password is bad. I was just interested if I
could create different ciphertexts for the same plaintext and
password, as an experiment. See?
Slightly revisionist history.
IIRC you were worried about having all bits of the plaintext change if
any one bit of the ciphertext was changed by Eve.
Because if all you were worried about was different ciphertexts from
same key and plaintext, that is already available from standard
constructions. Note this short example:
[...]
Same key, same plaintext, two different ciphertexts.
Both. I wanted each encryption using the same key and plaintext to create radically different ciphertexts.
Also, I wanted it to be bit sensitive. If a single bit of ciphertext is altered it will decrypt to random junk.
My HMAC Cipher experiment does both.
I think those are interesting things.