1993-01-27 - Coupled programs

Header Data

From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: 9dc5451395170fec30cdfc3dc067a5a7941dfbd75062096f715540abc456eabf
Message ID: <9301270339.AA18743@soda.berkeley.edu>
Reply To: <C1FxCF.757@pandora.sf.ca.us>
UTC Datetime: 1993-01-27 03:41:31 UTC
Raw Date: Tue, 26 Jan 93 19:41:31 PST

Raw message

From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Tue, 26 Jan 93 19:41:31 PST
To: cypherpunks@toad.com
Subject: Coupled programs
In-Reply-To: <C1FxCF.757@pandora.sf.ca.us>
Message-ID: <9301270339.AA18743@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain

>Eric Hughes (hughes@soda.berkeley.edu) wrote:
>: What needs to happen for
>: cryptography is the development of such protocols for key exchange,
>: signatures, and other cryptographic entities.

Mitra writes:
>I thought that was the point of PEM? Why not integrate the PGP
>encryption protocol into the PEM structure?

I am talking about interactive protocols.  To generate a session key
for communication with some remote host will require both parties to

PEM is a standard for "privacy enchanced" electronic email formats and
encryption methods.  PEM is not a standard for interacting protocols.