From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: 9dc5451395170fec30cdfc3dc067a5a7941dfbd75062096f715540abc456eabf
Message ID: <9301270339.AA18743@soda.berkeley.edu>
Reply To: <C1FxCF.757@pandora.sf.ca.us>
UTC Datetime: 1993-01-27 03:41:31 UTC
Raw Date: Tue, 26 Jan 93 19:41:31 PST
From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Tue, 26 Jan 93 19:41:31 PST
To: cypherpunks@toad.com
Subject: Coupled programs
In-Reply-To: <C1FxCF.757@pandora.sf.ca.us>
Message-ID: <9301270339.AA18743@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
>Eric Hughes (hughes@soda.berkeley.edu) wrote:
>: What needs to happen for
>: cryptography is the development of such protocols for key exchange,
>: signatures, and other cryptographic entities.
Mitra writes:
>I thought that was the point of PEM? Why not integrate the PGP
>encryption protocol into the PEM structure?
I am talking about interactive protocols. To generate a session key
for communication with some remote host will require both parties to
cooperate.
PEM is a standard for "privacy enchanced" electronic email formats and
encryption methods. PEM is not a standard for interacting protocols.
Eric
Return to January 1993
Return to “mjr@netcom.com (Matthew Rapaport)”