Encrypt two nonces with a master key, the root of a binary tree. Use the resulting ciphertexts as keys for the next level of the tree. Repeat. Data, perhaps messages, is at the leaves.
Don't know what this could be useful for.
Inspired by the theoretically bad idea of generating the key database from a single key.
No comments :
Post a Comment