On Wed, Jun 23, 2021 at 8:07 PM Ben Harris <m...@bharr.is> wrote:
>
> On Thu, 24 Jun 2021, 9:50 am Trevor Perrin, <tr...@trevp.net> wrote:
>>
>>
>> I think (b) is easy to check, so the risk with Encrypt()=XOR of
>> Hash(password) is about (a):  maybe Alice could find two DH public
>> values whose encodings have some XOR difference, and for which she
>> knows the discrete log?
>
>
> Alice could generate a nonce for the encryption using Hash(Encode(g^a)). Bob 
> can very the nonce was correctly generated before replying to Alice. This 
> makes the XOR depend on the public value?

Remember (b): if you add something which Bob can check to Alice's
message, then Bob can rule out passwords.

Trevor
_______________________________________________
Curves mailing list
Curves@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/curves

Reply via email to