![]() We'll call the message $p$ and encode it as a number. This brings me to the next point: the system you worked out in your head is highly insecure. Both are transferred in public and might be intercepted by a MITM. To be more specific – $q$ is Alice’s public key, and $f$ is Bob‘s public key. This second condition eliminates multiplication and division, since we could look at the three transmitted messages s*m, r*s*m, and r*m and easily compute m from them.įirst up: it does use public keys in contrast to your claims. Commutative encryptions satisfy D(d,E(k,E(e,m))) = D(d,E(e,E(k,m))) = E(k,m).Ī necessary condition for a three-pass algorithm to be secure is that an attacker cannot determine any information about the message m from the three transmitted messages E(s,m), E(r,E(s,m)) and E(r,m). it satisfies E(a,E(b,m))=E(b,E(a,m)) for all encryption keys a and b and all messages m. A commutative encryption is an encryption that is order-independent, i.e. This will always be possible with a commutative encryption. In other words, it must be possible to remove the first encryption with the key e even though a second encryption with the key k has been performed. In order for the encryption function and decryption function to be suitable for the Three-Pass Protocol they must have the property that for any message m, any encryption key e with corresponding decryption key d and any independent encryption key k, D(d,E(k,E(e,m))) = E(k,m). However there do exist actual encryption and decryption functions which do work this way - the necessary property is for the operations to be commutative, so that the encrypting and decrypting do not need to be done in a certain order. I assume you're using multiplication and division simply as example functions, but as others have mentioned these aren't suitable operations for this task because they're too easy to reverse. When Bob receives the box with only his padlock on it, Bob can then unlock the box with his key and read the message from Alice. When Alice receives the box with the two padlocks, she removes her padlock and sends it back to Bob. When Bob receives the box, he adds his own padlock to the box, and sends it back to Alice. She then sends the box to Bob through regular mail. Wikipedia describes a helpful metaphor using a box that can be locked by two padlocks:įirst, Alice puts the secret message in a box, and locks the box using a padlock to which only she has a key. You're describing a form of three-pass protocol, which is a communication mechanism where neither party needs to know each other's secret key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |