1992-11-30 - Secure key exchange

Header Data

From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: 4faab8c0134e06f5afcebda1c6c299abe30c331560681a94d284a1296a76d765
Message ID: <9211301721.AA17060@soda.berkeley.edu>
Reply To: <PBgyuB5w165w@spectrx.saigon.com>
UTC Datetime: 1992-11-30 17:22:03 UTC
Raw Date: Mon, 30 Nov 92 09:22:03 PST

Raw message

From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Mon, 30 Nov 92 09:22:03 PST
To: cypherpunks@toad.com
Subject: Secure key exchange
In-Reply-To: <PBgyuB5w165w@spectrx.saigon.com>
Message-ID: <9211301721.AA17060@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain



>There is no secure method of exchanging public keys using only the
>net.  [spoofing, etc.]

As mentioned by Hal, the new PGP 2.1 (imminent) has a feature to
create an hash or a public key which can be read over the telephone to
make sure that a key transmitted electronically has not been altered
in transmission.

>[long business description deleted]

There's really no need for a physical authentication service with the
telephone verfication ability.

>Plan B is to exchange/verify public keys face-to-face at parties,

There is just such a plan underway to have a PGP key exchange table at
Usenix in January.

>I have printed up business-card
>size copies of *fragments* of my public keys with the 6-hex-digit
>"Key ID".  

What could easily be printed is the hash function of the key.  That
would be even harder to duplicate.

Eric








Thread