Path: ...!3.eu.feeder.erje.net!feeder.erje.net!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" Newsgroups: sci.crypt Subject: Re: HMAC cipher and a TRNG... Date: Sun, 7 Jul 2024 22:34:06 -0700 Organization: A noiseless patient Spider Lines: 28 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Mon, 08 Jul 2024 07:34:07 +0200 (CEST) Injection-Info: dont-email.me; posting-host="d261bcbd6346c8c1e41bc57b2f9d4cc7"; logging-data="799894"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/baRb1DD8JQkgbZICc/JW7pycVl0y4ZJ8=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:nq1KOzBGFfEV9zSq3pSM04Srf6Y= In-Reply-To: Content-Language: en-US Bytes: 2222 On 7/7/2024 8:10 PM, Rich wrote: > Chris M. Thomasson wrote: >> A compromised secret password is bad. I was just interested if I >> could create different ciphertexts for the same plaintext and >> password, as an experiment. See? > > Slightly revisionist history. > > IIRC you were worried about having all bits of the plaintext change if > any one bit of the ciphertext was changed by Eve. > > Because if all you were worried about was different ciphertexts from > same key and plaintext, that is already available from standard > constructions. Note this short example: [...] > Same key, same plaintext, two different ciphertexts. Both. I wanted each encryption using the same key and plaintext to create radically different ciphertexts. Also, I wanted it to be bit sensitive. If a single bit of ciphertext is altered it will decrypt to random junk. My HMAC Cipher experiment does both. I think those are interesting things.