Deutsch English Français Italiano |
<v6ftof$od4m$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!3.eu.feeder.erje.net!feeder.erje.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: HMAC cipher and a TRNG... Date: Sun, 7 Jul 2024 22:34:06 -0700 Organization: A noiseless patient Spider Lines: 28 Message-ID: <v6ftof$od4m$1@dont-email.me> References: <v69m0j$3e2id$1@dont-email.me> <v69vjv$3fu1v$1@dont-email.me> <v6cclq$3veiq$1@dont-email.me> <v6cemu$3vkt2$1@dont-email.me> <v6eqj8$f608$1@dont-email.me> <v6flab$n028$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Mon, 08 Jul 2024 07:34:07 +0200 (CEST) Injection-Info: dont-email.me; posting-host="d261bcbd6346c8c1e41bc57b2f9d4cc7"; logging-data="799894"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/baRb1DD8JQkgbZICc/JW7pycVl0y4ZJ8=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:nq1KOzBGFfEV9zSq3pSM04Srf6Y= In-Reply-To: <v6flab$n028$1@dont-email.me> Content-Language: en-US Bytes: 2222 On 7/7/2024 8:10 PM, Rich wrote: > Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote: >> A compromised secret password is bad. I was just interested if I >> could create different ciphertexts for the same plaintext and >> password, as an experiment. See? > > Slightly revisionist history. > > IIRC you were worried about having all bits of the plaintext change if > any one bit of the ciphertext was changed by Eve. > > Because if all you were worried about was different ciphertexts from > same key and plaintext, that is already available from standard > constructions. Note this short example: [...] > Same key, same plaintext, two different ciphertexts. Both. I wanted each encryption using the same key and plaintext to create radically different ciphertexts. Also, I wanted it to be bit sensitive. If a single bit of ciphertext is altered it will decrypt to random junk. My HMAC Cipher experiment does both. I think those are interesting things.