Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The slide starting on PDF page 83 seems wrong? If I know (x, E_k(x)) for some x (or even without knowing them), then I can trivially compute (x', E_{k'}(x')) for k' and x' of my choosing.

Somewhat disappointing, since this slide is the only one in the presentation containing anything cryptographically "meaty".



I can trivially compute (x', E_{k'}(x')) for k' and x' of my choosing.

True, I oversimplified a bit. I was referring to situations where you don't know k' and x', e.g., x' = x and k' = k ^ \epsilon for some value \epsilon.


Ok, so what is the revised statement? "Referring to situations" is pretty vague...


Not if E is ideal. The point is that an ideal block cipher is not vulnerable to related key attacks. It should be indistinguishable from a random permutation. Selected uniformly from S_n, where n is the cardinality of the key space.


From what is on the slide, I can compute (x', E_{k'}(x')) for x' and k' of my choosing by just running the encryption algorithm.

(I know that ideal ciphers are defined correctly elsewhere, and agree that their definition makes sense.)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: