From: “Perry E. Metzger” <pmetzger@lehman.com>
To: cypherpunks@toad.com
Message Hash: 07c6778521a6d213bab500fc47321d925170678b78507494909b7a21da0be4d5
Message ID: <9307191643.AA27736@snark.shearson.com>
Reply To: <9307181614.aa18663@hermix.markv.com>
UTC Datetime: 1993-07-19 16:45:24 UTC
Raw Date: Mon, 19 Jul 93 09:45:24 PDT
From: "Perry E. Metzger" <pmetzger@lehman.com>
Date: Mon, 19 Jul 93 09:45:24 PDT
To: cypherpunks@toad.com
Subject: Re: Diffie-Hellman Weakness Weakness
In-Reply-To: <9307181614.aa18663@hermix.markv.com>
Message-ID: <9307191643.AA27736@snark.shearson.com>
MIME-Version: 1.0
Content-Type: text/plain
jpp@markv.com says:
> If you compare the digital interceptor, to the voice interceptor,
> fairly, you will see they are in equally strong positions.
>
> When I am phoneing a person I know, I am automatically checking the
> `signature' of their voice. The other party on the line might be able
> to convince me they have a cold, but I hope I will have enough wisdom
> to postpone discussing the March 15th assassination plot untill the
> cold clears up.
What if you are using a cheap vocoder because you don't have lots of
available CPU? With cheap vocoders, voices are not easily recognized.
What if you are using data and not voice?
DH key exchange is great -- if you are willing to do something to
actively authenticate the other end. Several protocols to do this have
been developed. Personally, I would not recommend doing without them
just on the basis that "I can recognise Fred's voice".
Perry
Return to July 1993
Return to ““Perry E. Metzger” <pmetzger@lehman.com>”