[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Photuris generality



> From: rogaway@cs.ucdavis.edu (Phil Rogaway)
> What cryptographers want and expect of a protocol like Photuris is
> that it works under the assumption that each of its primitives
> is instantiated to meet the (standard) definition of the goal of that
> primitive.

Primitives?

> You do not facilitate analysis
> by saying that Photuris is only required to work when its
> primitives are drawn from a certain concrete set of possibilities;
> exactly the opposite-- you render cryptographic analysis impossible.
>
Thank you, thank you!

It gladdens my heart to hear that self-described cryptographers find
that analysis is impossible!

I was worried that there would be some subtle flaw that would facilitate
cryptanalysis.  Now that you have assured us that it is not possible,
that makes Photuris the only protocol that has ever come to perfection!

Bill.Simpson@um.cc.umich.edu
          Key fingerprint =  2E 07 23 03 C5 62 70 D3  59 B1 4F 5E 1D C2 C1 A2