, E(M, K), M - , K - . , E .
K1 K2.
, E(E(M, K1), K2), . - E(M, K1), K2 , , E(E(M, K1), KF), KF - , .
. .
The implications are obvious. Assuming that you use correctly composed cryptographic primitives with combinations encryption function:key, if you encrypt every second block with a different key from a set of two keys, an attacker can only decrypt the blocks for which he has a key.
source
share