"Regular" solutions are really malleable. Depending on the block cipher
mode, it is quite easy to modify the ciphertext to affect the plaintext
in predictable ways. This goes from flipping bits while only breaking a single block all the way to being able to make arbitrary modifications
as long as you know the plaintext. This causes MACs to have a massive importance.
With this mode, any change to the ciphertext affects the entire
plaintext in a random way. It sort of
Nice! I need to study this some more for sure. Thanks Leo! :^)
Fwiw, I am kind of busy right now... Basically, it kind of reminds me
of one of my experimental HMAC ciphers. Altering a single byte of the
ciphertext causes a radically different plaintext to be generated,
random? Humm... A radically different ciphertext is generated on every
encryption of the exact same cipher text:
http://funwithfractals.atspace.cc/ct_cipher/
Fwiw, here in an online example using the default key to encrypt.
The online version has an option of sha-256 and sha-512 in the secret
key. You should be able to click on the link, and see the decrypted
message since it uses the default key.
Fwiw, as of now, it does not use a final MAC...
It sure seems to be fairly, "secure"... Although it has not been
properly peer reviewed yet. So, experimental is shall remain... ;^)
Also, try altering a single bit of the password and/or ciphertext, or changing the hash function, then clicking decrypt. The plaintext will be radically different.
On 2/1/2024 1:58 PM, Leo wrote:
Hey sci.crypt,
I wanted an encrypted and authenticated "secret box" like thing. Instead
of the usual IV + encrypted blob + MAC combination, I wanted to explore
the problem space and have a little fun.
Fwiw, [...]
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 14:23:24 |
Calls: | 10,389 |
Files: | 14,061 |
Messages: | 6,416,896 |