David Shaw <ds...@jabberwocky.com> writes:

> Hmm.  I'm not sure you and I are on the same page with this attack.  I
> don't think that Alice's rigged  message to Baker necessarily needs to
> be  forged to  come  from the  original  sender.  Alice  can send  the
> message to Baker as herself, with no special signing or other trickery
> to fool Baker  about the origin of the message.  She  can even sign it
> (as herself) if  she wants.  The contents of the  message just need to
> be something Baker would naturally reply to.

Yeah I got a bit carried off  there. So any way to counter that, besides
keeping a list  of (hash(cryptd-text), hash(session-key | random-parts))
to warn you if one is reused? Obviously that is a pretty dumb way, so is
there any way at all to counter a session-key-reuse attack?

-- 
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA

Attachment: pgpczBvUIKomF.pgp
Description: PGP signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to