From: Hal <74076.1041@CompuServe.COM>
To: <cypherpunks@toad.com>
Message Hash: 2e9c7ad0e488f757e137f01021892e21d2b070649e441bba5da27723abd0c632
Message ID: <93042322035574076.1041_FHD84-1@CompuServe.COM>
Reply To: _N/A
UTC Datetime: 1993-04-23 22:36:29 UTC
Raw Date: Fri, 23 Apr 93 15:36:29 PDT
From: Hal <74076.1041@CompuServe.COM>
Date: Fri, 23 Apr 93 15:36:29 PDT
To: <cypherpunks@toad.com>
Subject: Re: encrypted telnet
Message-ID: <930423220355_74076.1041_FHD84-1@CompuServe.COM>
MIME-Version: 1.0
Content-Type: text/plain
I missed the context because my mailbox overflowed, but Eric mentioned
Diffie-Hellman key exchange. If the need is for a one-shot quick-n-dirty
session key exchange (as for the audio talk program John Gilmore mentioned)
an alternative is to do a quick PGP keygen, send the session key across
using the PGP key, then destroy the PGP key.
The only reason I mention this is that it can be done in a couple of minutes
with existing tools tomorrow, if you need it. Eric is right that if you
are designing something from scratch DH is often more appropriate (although
PK's allow for authentication if you have a trusted signature, preventing
spoofing attacks).
Hal
Return to April 1993
Return to “Hal <74076.1041@CompuServe.COM>”
1993-04-23 (Fri, 23 Apr 93 15:36:29 PDT) - Re: encrypted telnet - Hal <74076.1041@CompuServe.COM>