1994-02-09 - Re: Crypto Regulation Reform

Header Data

From: jim@bilbo.suite.com (Jim Miller)
To: cypherpunks@toad.com
Message Hash: 95e9ec581b80e642a93915916774a6c20c765349a574dcbff2a33c0288e79b1a
Message ID: <9402090423.AA13621@bilbo.suite.com>
Reply To: N/A
UTC Datetime: 1994-02-09 04:32:13 UTC
Raw Date: Tue, 8 Feb 94 20:32:13 PST

Raw message

From: jim@bilbo.suite.com (Jim Miller)
Date: Tue, 8 Feb 94 20:32:13 PST
To: cypherpunks@toad.com
Subject: Re: Crypto Regulation Reform
Message-ID: <9402090423.AA13621@bilbo.suite.com>
MIME-Version: 1.0
Content-Type: text/plain



Robert Cain writes:

> We shall see.  I contend that with this I can establish a
> spoof-proof point to point with a total stranger to any
> desired probability that a spoof could not be there
> without disclosing him/her.
> 


Page 44 of "Applied Cryptography" discusses a point to point *public*  
key exchange protocol called the "Interlock Protocol" (invented by  
Ron Rivest and Adi Shamir).  This protocol is an attempt to foil the  
man-in-the-middle attack.  The protocol does not provide a %100  
guarantee against man-in-middle, but it does make it much harder (or  
so says the book).

Perhaps Robert's device really uses a variation of the Interlock  
Protocol, and not Diffie-Hellman (mentioned only as a red herring?).

<shrug>

Jim_Miller@suite.com





Thread