From: jim@bilbo.suite.com (Jim Miller)
To: cypherpunks@toad.com
Message Hash: 95e9ec581b80e642a93915916774a6c20c765349a574dcbff2a33c0288e79b1a
Message ID: <9402090423.AA13621@bilbo.suite.com>
Reply To: N/A
UTC Datetime: 1994-02-09 04:32:13 UTC
Raw Date: Tue, 8 Feb 94 20:32:13 PST
From: jim@bilbo.suite.com (Jim Miller)
Date: Tue, 8 Feb 94 20:32:13 PST
To: cypherpunks@toad.com
Subject: Re: Crypto Regulation Reform
Message-ID: <9402090423.AA13621@bilbo.suite.com>
MIME-Version: 1.0
Content-Type: text/plain
Robert Cain writes:
> We shall see. I contend that with this I can establish a
> spoof-proof point to point with a total stranger to any
> desired probability that a spoof could not be there
> without disclosing him/her.
>
Page 44 of "Applied Cryptography" discusses a point to point *public*
key exchange protocol called the "Interlock Protocol" (invented by
Ron Rivest and Adi Shamir). This protocol is an attempt to foil the
man-in-the-middle attack. The protocol does not provide a %100
guarantee against man-in-middle, but it does make it much harder (or
so says the book).
Perhaps Robert's device really uses a variation of the Interlock
Protocol, and not Diffie-Hellman (mentioned only as a red herring?).
<shrug>
Jim_Miller@suite.com
Return to February 1994
Return to “jim@bilbo.suite.com (Jim Miller)”
1994-02-09 (Tue, 8 Feb 94 20:32:13 PST) - Re: Crypto Regulation Reform - jim@bilbo.suite.com (Jim Miller)