From: rishab@dxm.ernet.in (Rishab Aiyer Ghosh)
To: cypherpunks@toad.com
Message Hash: c6641a9f9df84eaab2a51992518fca8f285da50bf429759ff35a6454b0d257da
Message ID: <awLe2c4w165w@dxm.ernet.in>
Reply To: <9502082007.AA09524@anchor.ho.att.com>
UTC Datetime: 1995-02-10 07:09:20 UTC
Raw Date: Thu, 9 Feb 95 23:09:20 PST
From: rishab@dxm.ernet.in (Rishab Aiyer Ghosh)
Date: Thu, 9 Feb 95 23:09:20 PST
To: cypherpunks@toad.com
Subject: Re: Selection key crypto protocol trial balloon
In-Reply-To: <9502082007.AA09524@anchor.ho.att.com>
Message-ID: <awLe2c4w165w@dxm.ernet.in>
MIME-Version: 1.0
Content-Type: text/plain
wcs@anchor.ho.att.com writes:
> > Um no. The main thing is that what is extracted with the selection key is
> > _different_ from what was put in...
>
> But the only things the selectioon key can extract are what the senders
> put in plus what the system did to it once it was there, which is not
> informationally different than what the senders put there.
True, just as ciphertext is not different, informationally, from plaintext.
It's just a pair of transformations, both by the system, one in response to
the sender and the other in response to the receiver. A bit like an airlock -
if the two transformations are the right ones, extraneous information such as
the identity should not pass through.
> I suppose you could play some games by sending the message in
> multiple parts, with parts sent by 1-way anonymous remailer,
> but there's still a certain amount of traffic analysis you can do.
>
> Bill
-----------------------------------------------------------------------------
Rishab Aiyer Ghosh "In between the breaths is
rishab@dxm.ernet.in the space where we live"
rishab@arbornet.org - Lawrence Durrell
Voice/Fax/Data +91 11 6853410
Voicemail +91 11 3760335 H 34C Saket, New Delhi 110017, INDIA
Return to February 1995
Return to “rishab@dxm.ernet.in (Rishab Aiyer Ghosh)”
Unknown thread root