pgpfan:ocfb
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pgpfan:ocfb [2022/11/29 18:42] – Ref to something gone. b.walzer | pgpfan:ocfb [2022/12/27 22:56] (current) – More truth. b.walzer | ||
---|---|---|---|
Line 7: | Line 7: | ||
{{cfb.svg}} | {{cfb.svg}} | ||
- | The " | + | The " |
The problem here is that the unique value is required to decrypt the message. So it has to be passed along with the message and can't be encrypted. So an attacker knows what it is and can change it to whatever they want. This allows them to, say, quietly chop off the start of the message without penalty. | The problem here is that the unique value is required to decrypt the message. So it has to be passed along with the message and can't be encrypted. So an attacker knows what it is and can change it to whatever they want. This allows them to, say, quietly chop off the start of the message without penalty. | ||
Line 15: | Line 15: | ||
{{ocfb.svg}} | {{ocfb.svg}} | ||
- | Now we have a fixed value of zero where the unique value used to be. So the attacker no longer has any ability to modify it. The result of encrypting a zero value produces an unpredictable value based on the key the attacker does not know. That value is combined with the unique value (that the attacker | + | Now we have a fixed value of zero where the unique value used to be. So the attacker no longer has any ability to modify it. The result of encrypting a zero value produces an unpredictable value based on the key the attacker does not know. That value is combined with the unique value (that must be random in this case so that the attacker |
This OpenPGP cipher feedback (OCFB) scheme works very well in combination with the OpenPGP [[pgpfan: | This OpenPGP cipher feedback (OCFB) scheme works very well in combination with the OpenPGP [[pgpfan: | ||
pgpfan/ocfb.1669747372.txt.gz · Last modified: 2022/11/29 18:42 by b.walzer