@ianbfarquhar @Falkvinge modern ciphers aren’t vulnerable to known plaintext attacks
-
-
Replying to @bascule
@bascule@Falkvinge It still can assist, and on that basis, should be avoided.1 reply 0 retweets 0 likes -
Replying to @ianbfarquhar
@ianbfarquhar@Falkvinge that’s called an OPSEC failure. It won’t help in pure cryptanalysis of e.g AES, Salsa, Chacha1 reply 0 retweets 0 likes -
Replying to @bascule
@bascule@Falkvinge Protocol design failure too. No KNOWN attacks. Focus on the "known". If attacks appear, bet they'll start as CP.2 replies 0 retweets 0 likes -
Replying to @ianbfarquhar
@ianbfarquhar@Falkvinge it would be an indication that the cipher fails to provide what Claude Shannon calls “confusion”1 reply 0 retweets 0 likes -
Replying to @bascule
@bascule@Falkvinge Differential cryptanalysis (NSA term "directional derivative" according to Whit), or any statistical attack, is.2 replies 0 retweets 0 likes -
Replying to @ianbfarquhar
@ianbfarquhar@Falkvinge if KPAs were a problem in practice with modern ciphers, full disk encryption wouldn't work2 replies 0 retweets 0 likes -
Replying to @bascule
@bascule@Falkvinge You keep taking in absolutes. Crypto design is rarely absolute: it's a risk management exercise.1 reply 0 retweets 0 likes -
Replying to @ianbfarquhar
@ianbfarquhar@Falkvinge if KPAs were a problem in practice, most of the things we use encryption for today simply wouldn't work1 reply 0 retweets 0 likes -
Replying to @bascule
@bascule@Falkvinge Go read the tweet history. I maintain you minimize it if you can as best practice.3 replies 0 retweets 0 likes
@ianbfarquhar @Falkvinge so no, sorry, you both couldn’t be more wrong
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.