From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: 4faab8c0134e06f5afcebda1c6c299abe30c331560681a94d284a1296a76d765
Message ID: <9211301721.AA17060@soda.berkeley.edu>
Reply To: <PBgyuB5w165w@spectrx.saigon.com>
UTC Datetime: 1992-11-30 17:22:03 UTC
Raw Date: Mon, 30 Nov 92 09:22:03 PST
From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Mon, 30 Nov 92 09:22:03 PST
To: cypherpunks@toad.com
Subject: Secure key exchange
In-Reply-To: <PBgyuB5w165w@spectrx.saigon.com>
Message-ID: <9211301721.AA17060@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
>There is no secure method of exchanging public keys using only the
>net. [spoofing, etc.]
As mentioned by Hal, the new PGP 2.1 (imminent) has a feature to
create an hash or a public key which can be read over the telephone to
make sure that a key transmitted electronically has not been altered
in transmission.
>[long business description deleted]
There's really no need for a physical authentication service with the
telephone verfication ability.
>Plan B is to exchange/verify public keys face-to-face at parties,
There is just such a plan underway to have a PGP key exchange table at
Usenix in January.
>I have printed up business-card
>size copies of *fragments* of my public keys with the 6-hex-digit
>"Key ID".
What could easily be printed is the hash function of the key. That
would be even harder to duplicate.
Eric
Return to November 1992
Return to “pmetzger@shearson.com (Perry E. Metzger)”