From: karn@qualcomm.com (Phil Karn)
To: guy@theporch.raider.net
Message Hash: f13146c70321077edd750fc598c2eadfa2594f106cf2955c9b09b2fbb96d7b37
Message ID: <9308112117.AA03868@servo>
Reply To: <m0oQB7m-0009UVC@theporch.raider.net>
UTC Datetime: 1993-08-11 21:22:05 UTC
Raw Date: Wed, 11 Aug 93 14:22:05 PDT
From: karn@qualcomm.com (Phil Karn)
Date: Wed, 11 Aug 93 14:22:05 PDT
To: guy@theporch.raider.net
Subject: Secure voice software issues
In-Reply-To: <m0oQB7m-0009UVC@theporch.raider.net>
Message-ID: <9308112117.AA03868@servo>
MIME-Version: 1.0
Content-Type: text/plain
>To me at least this seems unimportant for the application. If all you're
>doing is exchanging session keys over the phone, it doesn't really matter if
>you are sure that the public key actually belongs to who it claims it does,
Well...yes. *If* you know the person you are talking to, then you can
read off your session key (or preferably its hash) to guard against the
man in the middle. But let's say you are being referred to someone who
you don't already know (or you know them only by email, and have no idea
what they sound like). You trust this person, but you can't depend on
an oral challenge-response. The existing PGP web should be handy here.
Phil
Return to August 1993
Return to “thug@phantom.com (Murdering Thug)”