An imp. piece of information hygiene many seem to not know: if you ever send a previously-encrypted text in cleartext, you leak the keys.
-
-
Replying to @Falkvinge
@Falkvinge Not really. You make cryptanalysis easier by giving them lots of known plaintext, but you do not automatically leak the key.2 replies 1 retweet 2 likes -
Replying to @ianbfarquhar
@ianbfarquhar@Falkvinge modern ciphers aren’t vulnerable to known plaintext attacks2 replies 0 retweets 2 likes -
Replying to @bascule
@bascule@Falkvinge It still can assist, and on that basis, should be avoided.1 reply 0 retweets 0 likes -
Replying to @ianbfarquhar
@ianbfarquhar@Falkvinge that’s called an OPSEC failure. It won’t help in pure cryptanalysis of e.g AES, Salsa, Chacha1 reply 0 retweets 0 likes -
Replying to @bascule
@bascule@Falkvinge Protocol design failure too. No KNOWN attacks. Focus on the "known". If attacks appear, bet they'll start as CP.2 replies 0 retweets 0 likes
@ianbfarquhar @Falkvinge obtaining a key via KPA in a modern cipher would indicate an incredibly severe design flaw in the cipher
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.