Академический Документы
Профессиональный Документы
Культура Документы
Who am I?
Contributor to n|u
Blog: http://adhokshajmishraonline.in
Email: me@adhokshajmishraonline.in
Agenda
Why counter-surveillance?
Secure authentication
Crooked Activities
Why counter-surveillance?
Secure Authentication
intercepted
by
Private Messaging
Desired properties:
Encryption
Authentication
Deniability
Sends to Alice
r, AES(key=c, Xb), MAC(m2)(AES(key=c, Xb))
Verifies H by recalculating it
Calculates
Ma = MAC(m1')(g^y, g^x, pub_A, keyid_A)
Xa = pub_A, keyid_A, sig(A, Ma)
Bob
uses m2' to verify MAC(m2')(AES(key=c', Xa))
uses c' to decrypt AES(key=c', Xa)
calculates Ma = MAC(m1')(g^y, g^x, pub_A,
keyid_A)
uses pub_A to verify sig(A, Ma)
Thank You