tag:blogger.com,1999:blog-22537170.post3119926433278333293..comments2023-12-25T03:34:09.035+02:00Comments on Gadi Evron on Cyber Security and Privacy: ISOI 5, Tallinn, Estonia - Summary!Gadi Evronhttp://www.blogger.com/profile/01795285860133430029noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-22537170.post-33711783455929148692008-10-15T13:04:00.000+02:002008-10-15T13:04:00.000+02:00the plausible deniability is provided only by that...the plausible deniability is provided only by that mechanism, not through changing the keys after each message. That's only the mechanism used to recover the security of the algorithm after key disclosure. It's the typical cryptographic type of proof if authenticity which is executed in a way which is only ever trustworthy to the recipient, so the recipient cannot prove anything to others with it.<BR/>-------------<BR/>Sally<BR/><A HREF="http://www.drivenwide.com" REL="nofollow">Social Marketing</A>sallreenhttps://www.blogger.com/profile/06547630360373659588noreply@blogger.com