Reducing risks from poorly chosen keys
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Using encryption for authentication in large networks of computers
Communications of the ACM
Interaction faults caused by third-party external systems: a case study and challenges
ISAS'08 Proceedings of the 5th international conference on Service availability
Hi-index | 0.00 |
In a cryptographic protocol, it is important for a recipient to determine that a message has not been modified during transmission. This is normally achieved by providing redundancy in the message. Typically, a message is described in the literature as containing enough redundancy, not enough redundancy, or no redundancy at all. This note shows that, because of the secrecy that comes with encryption, redundancy can be provided at two different levels. An example demonstrates that this distinction is useful in guarding against certain cryptographic attacks on weak keys.