Update of "Experiment: mmmv_symsig_t1"
Not logged in
Overview

Artifact ID: 39ced44847c47fd3adcbc386c44e670f78b338d7
Page Name:Experiment: mmmv_symsig_t1
Date: 2017-10-08 19:27:41
Original User: martin_vahi
Parent: 771c6f2aebe1aaf115467bd184cd8a0b80453b18 (diff)
Next 027c03b1fecdcce9de62e60dbe3b43e4efd6d5d0
Content

The mmmv_symsig_t1 wraps symmetric key encryption command line tools and implements a signing system, where parties, who have never met directly for a key exchange can probabilistically authenticate each other. The feasibility of using one-time-pads or one-time-pad like ciphers is based on the fact that a year 2017 price for 1GiB of USB-stick based flash memory costs about 1€. With the exception of metadata related security issues, one-time-pad like ciphers tend to eliminate security flaws at the encryption algorithm side.

It's worth to note here that if both of the keys of a public encryption algorithm are bundled together and the bundle is treated the same way as symmetric key encryption keys are treated, then public key encryption algorithms can be used as symmetric key encryption algorithms. That allows the "standard" tools like the GNU Privacy Guard to be used in the role of the symmetric key encryption algorithm implementation.


Overview

/raw/2c33dc040db045bc915cc169f7526d4619e6d96e?m=image/png