Changes To Experiment: mmmv_symsig_t1
Not logged in

Changes to "Experiment: mmmv_symsig_t1" between 2017-10-10 07:04:10 and 2017-10-10 07:12:10

    18     18   
    19     19   <p><i>It's worth to note that if both keys of a public encryption algorithm are
    20     20   bundled together and the whole pair is kept secret the way &nbsp;symmetric keys
    21     21   are kept secret, then public key encryption algorithms can be used as symmetric
    22     22   key encryption algorithms. That allows the "standard" tools like the
    23     23   <a href="https://gnupg.org/">GNU Privacy Guard</a> to be used in the role of
    24     24   the symmetric key encryption algorithm implementation.</i></p>
           25  +
           26  +<p><i><br>
           27  +</i></p>
           28  +
           29  +<h1>Definiton of some of the Terms</h1>
           30  +
           31  +<div><b>Onionencryption</b>&nbsp;stands for an encryption activity, where&nbsp;</div>
           32  +
           33  +<div><br>
           34  +</div>
           35  +
           36  +<div>//----------------------------------------------------</div>
           37  +
           38  +<div><font face="Courier New">&nbsp; &nbsp; ciphertext = encrypt_with_key_N(&nbsp;</font></div>
           39  +
           40  +<div><font face="Courier New">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
           41  +&nbsp; &nbsp; &nbsp; &nbsp;encrypt_with_key_(N-1)(&nbsp;<br>
           42  +</font></div>
           43  +
           44  +<div><font face="Courier New">&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;
           45  +&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;encrypt_with_key_(N-2)(&nbsp;<br>
           46  +</font></div>
           47  +
           48  +<div><font face="Courier New">&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;
           49  +&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;</font>
           50  +
           51  +<span style="font-family: &quot;Courier New&quot;;">&nbsp; &nbsp; &nbsp; &nbsp;
           52  +&nbsp; &nbsp; &nbsp;...</span></div>
           53  +
           54  +<div><font face="Courier New">&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;
           55  +&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;</font>
           56  +
           57  +<span style="font-family: &quot;Courier New&quot;;">&nbsp; &nbsp; &nbsp; &nbsp;
           58  +&nbsp;encrypt_with_key_(2)(&nbsp;</span></div>
           59  +
           60  +<div><font face="Courier New">&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;
           61  +&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;
           62  +&nbsp; &nbsp; &nbsp;encrypt_with_key_(1)(</font></div>
           63  +
           64  +<div>
           65  +
           66  +<span style="font-family: &quot;Courier New&quot;;">&nbsp; &nbsp; &nbsp; &nbsp;
           67  +&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
           68  +&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;cleartext())</span></div>
           69  +
           70  +<div>
           71  +
           72  +<span style="font-family: &quot;Courier New&quot;;">&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</span><font face="Courier New">&nbsp;
           73  +&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;</font>
           74  +
           75  +<span style="font-family: &quot;Courier New&quot;;">&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</span><font face="Courier New">&nbsp;
           76  +&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;</font>
           77  +
           78  +<span style="font-family: &quot;Courier New&quot;;">&nbsp; &nbsp; &nbsp;)</span></div>
           79  +
           80  +<div><font face="Courier New">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
           81  +&nbsp; &nbsp; &nbsp; &nbsp; </font>
           82  +
           83  +<span style="font-family: &quot;Courier New&quot;;">&nbsp; &nbsp; &nbsp; &nbsp;...</span></div>
           84  +
           85  +<div><font face="Courier New">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
           86  +&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;) // N-2</font><br>
           87  +</div>
           88  +
           89  +<div><font face="Courier New">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
           90  +&nbsp; &nbsp; &nbsp; &nbsp;) &nbsp; &nbsp; // N-1<br>
           91  +</font></div>
           92  +
           93  +<div><font face="Courier New">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
           94  +&nbsp; &nbsp;) &nbsp; &nbsp; &nbsp; &nbsp; // N<br>
           95  +</font></div>
           96  +
           97  +<div>//----------------------------------------------------<br>
           98  +</div>
    25     99   
    26    100   <p><br>
    27    101   </p>
    28    102   
    29    103   <h1>The Scheme</h1>
          104  +
          105  +<div><br>
          106  +</div>
    30    107   
    31    108   <div>End users(hereafter: <b>EnU</b>), including
    32    109   <a href="https://en.wikipedia.org/wiki/Alice_and_Bob">the Bob and the Alice</a>,
    33    110   individually meet with a key exchange service provider&nbsp;(hereafter: <b>KXS</b>).
    34    111   The KXS gives each EnU multiple GiB worth of symmetric keys that are shared
    35    112   only between the KXS and the EnU. If the EnUs have not met with each other for
    36    113   a key exchange, then the