tech-crypto archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Initial entropy with no HWRNG
> Date: Tue, 12 May 2020 13:05:01 -0400 (EDT)
> From: Mouse <mouse%Rodents-Montreal.ORG@localhost>
>
> >> B1) Because they already got the binaries or the sources from us; we
> >> could simply tamper those to do the wrong thing instead.
> > Tampering is loud, but eavesdropping is quiet. There is no way to do
> > this that is resistant to eavesdropping without a secret on the
> > client side.
>
> Ironically, there is, from an algorithms perspective, the simplest
> perhaps being Diffie-Hellmann. (D-H is as hard as discrete log, for
> passive eavesdroppers. It's active MitM that it's not enough for.)
> The irony arises because, as far as I know, all such algorithms require
> randomness - or at least unpredictability to the attacker - on each
> end, making this a chicken-and-egg problem.
>
> Or is that what you meant by "a secret"?
That is exactly what I meant by `a secret'.
Home |
Main Index |
Thread Index |
Old Index