1995-02-01 - Re: ESP Unix encrypted session protocol software

Header Data

From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 5f992d1bb3e8ce71fd73bc52f90e36bde02744db97a930db7463e57db06674a0
Message ID: <199502011656.IAA05742@largo.remailer.net>
Reply To: <Pine.SUN.3.91.950201020755.4492A-100000@reggae.src.umd.edu>
UTC Datetime: 1995-02-01 16:58:07 UTC
Raw Date: Wed, 1 Feb 95 08:58:07 PST

Raw message

From: eric@remailer.net (Eric Hughes)
Date: Wed, 1 Feb 95 08:58:07 PST
To: cypherpunks@toad.com
Subject: Re: ESP Unix encrypted session protocol software
In-Reply-To: <Pine.SUN.3.91.950201020755.4492A-100000@reggae.src.umd.edu>
Message-ID: <199502011656.IAA05742@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain


   From: Thomas Grant Edwards <tedwards@src.umd.edu>

   I am thinking of the 
   use of a trusted adjudicator who could receive information from both the 
   original participants and check to see if the two keys matched.

How do you authenticate the adjudicator?

You'll have to communicate with the adjudicator and verify one of
their signatures.  You can just as easily exchange signed DH
parameters directly with the other party and verify the signature of
your correspondent.

This is another one of those problems where potential solutions often
just lead to infinite regress.

Eric







Thread