3 | | ||''what bad thing could happen''||''who could do it''||''what could they target''||''what crypto property prevents it''||''how expensive to brute force''|| |
4 | | ||shape-shifter immutable file [footnote 1]||creator of a file||their own file||the hash function's and cap format's collision resistance on the read-cap (''R'',''T'')||2^(''r''+''t'')/2^|| |
5 | | ||unauthorized read||anyone||any file||the cipher's security and the secrecy of the read-key ''R''||2^''r''^|| |
6 | | ||forgery of immutable file||anyone||any file||the hash function's and cap format's second-pre-image resistance on (''R'',''T'')||2^''r''+''t''^|| |
| 3 | ||#||''what bad thing could happen''||''how''||''who could do it''||''what could they target''||''what crypto property prevents it''||''how expensive to brute force''|| |
| 4 | ||1||shape-shifter immutable file [footnote 1]||collide read-cap (''R'',''T'')||creator of a file||their own file||the hash function's and cap format's collision resistance on the read-cap (''R'',''T'')||2^(''r''+''t'')/2^|| |
| 5 | ||2||unauthorized read||attack the encryption of ''K'' with ''R''||anyone||any one file||the cipher's security and the secrecy of the read-key ''R''||2^''r''^|| |
| 6 | ||3||forgery of immutable file||generate a matching read-cap (''R'',''T'') for someone else's file||anyone||any one file||the hash function's and cap format's second-pre-image resistance on (''R'',''T'')||2^''r''+''t''^|| |
| 7 | ||4||roadblock or speedbump [footnote 2]||generate (''V'',''K'',''D'') which hash to a someone else's ''T'', and copy their ''S''||anyone||any one file||the hash function's and cap format's collision resistance on ''T''||2^''t''^|| |
| 8 | ||5||unauthorized read||attack the encryption of the plaintext with ''K''||anyone||any one file||the cipher's security and the secrecy of the encryption key ''K''||2^''k''^|| |
| 9 | ||6||unauthorized read||figure out the input to the hash function that generates ''S''||anyone||any one file||the hash function's pre-image resistance on ''S''||brute force attack on ''R'' is !#2|| |