You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add key commitment to prevent invisible salamanders attack
Implements a key binding strategy that ensures a ciphertext can only be decrypted with the exact key used for encryption, preventing the invisible salamanders attack.
This implementation:
1. Derives a committed key from the original key and nonce
2. Uses the committed key for encryption/decryption operations
3. Ensures an attacker cannot create different keys that decrypt to different messages
References: https://soatok.blog/2024/09/10/invisible-salamanders-are-not-what-you-think/
and the paper 'Committing Authenticated Encryption: Generic Transforms with Hash Functions'
0 commit comments