Deniable encryption allows the sender of an encrypted bulletin to abjure sending that message. This requires a trusted third party. A accessible book works like this:
Alice is the wife of Bob, who suspects his wife is affianced in adultery. She wants to acquaint with her abstruse lover Carl. She creates two keys, one advised to be kept secret, the added advised to be sacrificed. She passes the abstruse key (or both) to Carl.
Alice constructs an banal bulletin M1 for Carl (intended to be appear to Bob in case of discovery) and an incriminating adulation letter M2 to Carl. She constructs a cipher-text C out of both letters M1, M2 and emails it to Carl.
Carl uses his key to break M2 (and possibly M1, in adjustment to apprehend the affected bulletin too).
Bob finds out about the email to Carl, becomes apprehensive and armament Alice to break the message.
Alice uses the sacrificial key and reveals the banal bulletin M1 to Bob. Since Bob does not apperceive the added key, he has to accept that there is no added bulletin M2.
Another accessible book involves Alice sending the aforementioned ciphertext (some abstruse instructions) to Bob and Carl, to whom she has handed altered keys. Bob and Carl are to accept altered instructions and accept not to be able to apprehend anniversary added instructions. Bob will accept the bulletin aboriginal and again advanced it to Carl.
Alice constructs the ciphertext out of both letters M1, M2 and emails it to Bob.
Bob uses his key to break M1 and isn't able to apprehend M2.
Bob assiduously the ciphertext to Carl.
Carl uses his key to break M2 and isn't able to apprehend M1.
Alice is the wife of Bob, who suspects his wife is affianced in adultery. She wants to acquaint with her abstruse lover Carl. She creates two keys, one advised to be kept secret, the added advised to be sacrificed. She passes the abstruse key (or both) to Carl.
Alice constructs an banal bulletin M1 for Carl (intended to be appear to Bob in case of discovery) and an incriminating adulation letter M2 to Carl. She constructs a cipher-text C out of both letters M1, M2 and emails it to Carl.
Carl uses his key to break M2 (and possibly M1, in adjustment to apprehend the affected bulletin too).
Bob finds out about the email to Carl, becomes apprehensive and armament Alice to break the message.
Alice uses the sacrificial key and reveals the banal bulletin M1 to Bob. Since Bob does not apperceive the added key, he has to accept that there is no added bulletin M2.
Another accessible book involves Alice sending the aforementioned ciphertext (some abstruse instructions) to Bob and Carl, to whom she has handed altered keys. Bob and Carl are to accept altered instructions and accept not to be able to apprehend anniversary added instructions. Bob will accept the bulletin aboriginal and again advanced it to Carl.
Alice constructs the ciphertext out of both letters M1, M2 and emails it to Bob.
Bob uses his key to break M1 and isn't able to apprehend M2.
Bob assiduously the ciphertext to Carl.
Carl uses his key to break M2 and isn't able to apprehend M1.
No comments:
Post a Comment