The symmetric ciphers
    Philipp Klaus Krause 
    pkk at spth.de
       
    Wed Oct 30 20:25:41 CET 2013
    
    
  
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Am 10.09.2013 12:35, schrieb Philipp Klaus Krause:
> I wonder if it would be a good idea to have an option to combine 
> symmetric ciphers, e.g. users could state a preference list like
> this:
> 
> TWOFISH+AES256 3DES+BLOWFISH+AES AES 3DES
> 
> The meaning of A+B would be to encrypt using A first, and then
> encrypt the result using B with a different key. Assuming it takes
> effort a to break cipher A and effort b to break cipher b, this
> should result in effort at least max(a, b) needed to break A+B. And
> with uncertainity about possible weaknesses in individual ciphers,
> this seems like a reasonable measure to me.
> 
> Philipp
If we have plenty of randomness available, we could do this a
different way:
XOR the message M with a random one-time pad P to obtain N. Encrypt P
with A, and N with B.
The drawback is that this doubles the lenth of the message.
Philipp
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/
iEYEARECAAYFAlJxXTEACgkQbtUV+xsoLpqEhwCgnb7/AFx3b8q6a/sFPfPSt4NG
8SYAn3DgDL2BXYAwdfdcTSl+tBDJ/Jwt
=Hsq+
-----END PGP SIGNATURE-----
    
    
More information about the Gnupg-users
mailing list