1995-01-12 - Re: Multiple symetric cyphers

Header Data

From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: a5077e7f00ba86c43aa5180c664771f800b2fa71245c04979c5c33bb47af87ed
Message ID: <199501121623.IAA00846@largo.remailer.net>
Reply To: <199501120607.BAA19021@bb.hks.net>
UTC Datetime: 1995-01-12 16:24:36 UTC
Raw Date: Thu, 12 Jan 95 08:24:36 PST

Raw message

From: eric@remailer.net (Eric Hughes)
Date: Thu, 12 Jan 95 08:24:36 PST
To: cypherpunks@toad.com
Subject: Re: Multiple symetric cyphers
In-Reply-To: <199501120607.BAA19021@bb.hks.net>
Message-ID: <199501121623.IAA00846@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain


   From: cactus@seabsd.hks.net (L. Todd Masco)

   >Strength is not right aspect.  Global risk is reduced, simply because
   >the aggregate cost of a breach is reduced.

   Isn't it?  If an attacker does not know what cipher is used and breaking
   each is computationally expensive (though not prohibitively so) doesn't
   that add extra complexity?

Suppose that several symmetric ciphers are used and that one of them
is broken.  You then attempt to break all of the messages; the ones
that don't break are presumed to be one of the other ciphers.  So it
does nothing to improve strength.  Note, though, that the _rest_ of
the messages remain unbroken.

I am assuming that it's unlikely that all of the ciphers will be
broken simultaneously.

   Related: is there, in general or in any known specific cases, any
   loss of security in using sym. cipher A on ciphertext B (of another
   sym. cipher) with the same key?  With different keys (I would think
   not, but I vaguely remember mention of something here long ago)?

If you use the same key, the size of exhaustive search does not
increase.

Eric





Thread