Sir Ian Malcolm, Phd, Dr, Md, Esq, ND, PMP, RN on Nostr: from the cryptography mailing list The introduction is well worth reading. It seems ...
from the cryptography mailing list
The introduction
https://strobe.sourceforge.io/papers/strobe-latest.pdfis well worth reading.
It seems that it is possible to implement secure communication protocols
with a very limited number of operations (10 different core functions)
and 4 bits of flags all based on one STROBE primitive (KECCAK-f).
The interesting part is the fact that while the protocol for information
exchange moves on, a transcript of past stages is recorded that affects
future operations.
"Strobe maintains a running hash of the protocol transcript,
which is the sequence of all operations and their data as seen
by the application layer."
The inclusion of these transcripts in subsequent operations clearly helps
to ensure, that the protocol develops as expected. Though it also
imposes limitations to what the protocol can achieve. The paper claims
that TLS can be implemented based on minimal STROBE operations.
While the implementation is targeted on IoT systems with limited computation
powers, this idea is IMHO quite interesting and promising.
-ralf
Show quoted text
Published at
2024-08-08 03:23:08Event JSON
{
"id": "3e57a19649da78d01fc06407d51d91ce6a276f9b97646cb23967629f35d693cd",
"pubkey": "eff0899a8d3e8ed7d7524b86f5a7077c1ec39ee305c191738b29b0bbfa20fe42",
"created_at": 1723087388,
"kind": 1,
"tags": [],
"content": "from the cryptography mailing list \n\n\n\n\n\nThe introduction https://strobe.sourceforge.io/papers/strobe-latest.pdf\nis well worth reading.\n\nIt seems that it is possible to implement secure communication protocols\nwith a very limited number of operations (10 different core functions)\nand 4 bits of flags all based on one STROBE primitive (KECCAK-f).\nThe interesting part is the fact that while the protocol for information\nexchange moves on, a transcript of past stages is recorded that affects\nfuture operations.\n\n \"Strobe maintains a running hash of the protocol transcript,\n which is the sequence of all operations and their data as seen\n by the application layer.\"\n\nThe inclusion of these transcripts in subsequent operations clearly helps\nto ensure, that the protocol develops as expected. Though it also\nimposes limitations to what the protocol can achieve. The paper claims\nthat TLS can be implemented based on minimal STROBE operations.\n\nWhile the implementation is targeted on IoT systems with limited computation\npowers, this idea is IMHO quite interesting and promising.\n\n\n -ralf\nShow quoted text\n",
"sig": "5071f90dcf1a20977f768126819bd4e9864dafb5e0ece979f57deaddcda6a188d6f5694b1b4fa9e35c0323cef1f342cc11d500f96defa2b49074330dc93a8519"
}