There is an algorithm called diffie-hellman. It is used for allowing Alice and Bob to derive a shared secret with each other. Alice sends her public key to Bob, and Bob sends his public key to Alice. When the algorithm is applied, Alice's private key + Bob's public key creates the same output string as Bob's private key + Alice's public key. This allows them to have a shared secret between them, as any man in the middle who can wiretap their communications is incapable of determining the shared secret as he only has access to their public keys (which he observes them send to each other) but not their private keys (which they keep secret from everyone).
Here is a visual summary:
The problem with this is that an active man in the middle can engage in a man in the middle attack, whereby he grabs Alice's (and also Bob's) public keys, drops them, and inserts his own public key in both directions (so Alice gets his public key and so does Bob). Now Alice has a shared secret with the attacker who she thinks is Bob, and Bob also has another shared secret with the attack who he thinks is Alice. Now the attacker can intercept their communications in the future, decrypt them and read them, then re-encrypt them with the malicious shared secrets to make it look like nothing happened. This is a very damning and hard to protect from attack in cryptography.
Fortunately we can utilize the magical revictimization property of CP viewing to prevent this attack! It works as follows:
1. Alice and Bob, both at separate locations, desire to engage in a shared secret protocol. Bob hooks up a previously molested child to a brainwave reading device
2. Alice loads CP of Bob's victimized child onto a computer screen, and flashes it in a modulated pattern. Each time she perceives the image of victimization, magical revictimization happens. Law Enforcement and the Prison Industry and Normalfags say that this revictimization is just like the original abuse happening all over again. Therefore, each time the image flashes we should expect the brainwaves of Bobs victim child to have brain activity associated with being sexually abused.
3. The pattern that Alice flashes the CP in is synchronized to a secret bit string she generates. The output of the victimized child's brainwaves can be analyzed over time to reconstruct the bit string at bobs end!
4. Since there is no channel over which this communication flows, and it just magically happens that communications are transported from one point to another without needing to travel through an untrusted middle channel, there is no middle positioning for an attacker to intercept the communication and engage in a man in the middle attack from! Therefore, this technique is immune to man in the middle attacks, and should provide security far superior to that of diffie-hellman !
Last edited by mrz on Sun Feb 22, 2015 6:32 pm, edited 1 time in total.