[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: tagging attacks and forward-message/reply-message distinction




[following up to my own post]

In my excitement I overlooked two typos:

> 2.b.  We can implement 1.a. for reply-message headers and 1.b. for reply-message 
> payload by having the original sender include MACs, only for headers, in the 
> reply block, and having the payload be {en,de}crypted at every hop and never 
> visible as decrypted plaintext except to the original sender.  (This means that 
> the padding has to be appended to the headers instead of the payload so that the 
> node can MAC over the headers without knowing how many layers are left to be 
> processed.  It also means that the padding has to be deterministically generated 
> from a secret know to the original sender and to the generating node but not to 
                ^^^^-- "known"
> anyone else.)

...

> Now for every part of the message we have one or other the guarantee: either it 
                                            ^^^^^^^^^^^^^^^^-- "one or the other"
> comes with a MAC and it gets verified at every hop, or it gets re-encrypted at 
> every hop and nobody ever sees the resulting decrypted plaintext except for the 
> original sender.