very short plaintexts symmetrically encrypted
    Werner Koch 
    wk at gnupg.org
       
    Tue Jan 12 09:35:17 CET 2010
    
    
  
On Mon, 11 Jan 2010 13:06:03 -0500, lists.gnupg-users at mephisto.fastmail.net wrote:
> Forgive me, but how is a MitM attack possible against a symmetric cypher
> using a shared, secret key?
For example by swapping messages.  Two messages are sent on two
out-of-band events one which says Yes and the other says No.  If you
can mount an active MitM attack you can revert the meaning.  A MitM
may also inject faults to make the received message look like a
transmission error and thereby triggering another message.
Right, you can counter such attacks by adding more information to the
message.  However, the original post was about two short messages.
Salam-Shalom,
   Werner
-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.
    
    
More information about the Gnupg-users
mailing list