• 0 Posts
  • 17 Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle










  • Doesn’t break the algorithm though, you would just have the key and then can use the algorithm (that still works!) to decrypt data.

    Also you’re talking about one class of cryptography, the concept of key knowledge varies between algorithms.

    My point is an attacker having knowledge of the key is a compromise, not a successful break of the algorithm…

    “the attacker beat my ass until I gave them the key”, doesn’t mean people should stop using AES or even RSA, for example.






  • I’d say the purpose of the feature is to do as intended, ensure the documents authenticity and integrity. The mechanism still requires people trust your signature (public key), so you need another strategy to establish that trust. If you wanted to share a confidential document to a person you know on discord, and they already trust your discord profile, you would need to use said profile to get people to trust the key you’re going to use, belongs to and identifies you. This really isn’t different from third party Cas, just a lot of certificates from them are already trusted by default and part of the internet wide key infrastructure.