If I understood correctly, the Signal protocol generates a new key after every message sent and forgets the previous one. Telegram, on the other hand, renews the key only after 100 messages or one week. Thus, is there a certain attack window (1 week / 100 messages) with Telegram's protocol?
Asked
Active
Viewed 268 times
4
-
2Note that once we have this The backdoor of Telegram on Diffie-Hellman Key Exchange and possibly other examples?, I don't trust on the Telegram. Only expecting that there is a hidden backdoor deeper somewhere. – kelalaka Dec 08 '21 at 16:15
1 Answers
2
I think renew keys after a key generation is problematic because assume that key is already generated by the application. If somehow generate key pass through a function $H(x) = B(preImg(x))$. In simple language a function that somehow analysis key pattern and calculate $n$ pre-images of $x$.

kelalaka
- 48,443
- 11
- 116
- 196

Ali Hassan
- 29
- 2
-
-
https://crypto.stackexchange.com/questions/8786/sha-256-probabilistic-partial-preimage-possible – Ali Hassan Dec 09 '21 at 05:28
-
1I know that but how this really occurs in your answer. I want to see a robust answer, not something like I think... – kelalaka Dec 09 '21 at 08:23