Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

5
  • Many thanks for taking time to write your answer. The 3 level encryption password (sym) -> public/private (asym) -> data (sym) is clearly solving the problem of sharing data between users not being connected at the same time. Commented Jun 18, 2015 at 6:24
  • Because K is only encrypted with public keys it's trivial for an attacker to regenerate K and replace the original file content. The attacker would never have access to the original content, but being able to change the content in a way that it's still readable is a big flaw. Commented Apr 9, 2018 at 15:57
  • @dhinchliff How is it trivial to regenerate K? Commented Apr 25, 2018 at 19:52
  • @interlude Just pick any K, K = "puppy" if you like. Then encrypt the new data with the new K and encrypt the new K with the receiver's public key. Commented Apr 26, 2018 at 10:37
  • @dhinchliff I don't know the official jargon for this but wouldn't that be a K' or K2 or something? Your comment made me think that it's easy to find K somehow. But still I'm not used to the jargon and English is not my native language Commented Apr 28, 2018 at 16:27