0 Followers
0 Following
0 Posts

Can this messaging protocol achieve cryptographic deniability?

https://leminal.space/post/23416713

Can this messaging protocol achieve cryptographic deniability? - Leminal Space

I’m designing an identity-less, ephemeral messaging protocol where messages can be forged after-the-fact. The goal is protection against coercion or device seizure scenarios. Core mechanism: * Session keys derived via SPAKE2 from shared secret * ChaCha20 encryption with deterministic nonces: sequence || timestamp * HMAC authentication during conversation Forgery capability: Anyone with session keys can create alternative messages using the same sequence/timestamp that decrypt to different content. My question: Does this actually achieve cryptographic deniability? Are there ways someone could distinguish a real conversation transcript from a forged one? I have a working prototype and want to validate that the approach is sound.

Revery v0: identity-less, ephemeral, deniable messaging.

https://leminal.space/post/23380526

Revery v0: identity-less, ephemeral, deniable messaging. - Leminal Space

i’ve been working on this for a bit, finally got a proof of concept worked out with a desktop app. would love some feedback, mostly on the concept and protocol. it hasn’t been security audited so don’t use it for anything crazy.