1994-02-06 - Re: Some stuff about Diffie-Hellman (and more :-)

Header Data

From: mgream@acacia.itd.uts.edu.au (Matthew Gream)
To: cypherpunks@toad.com
Message Hash: ba2185473a37adf88fce04aa2656ee1b93654eff938451c32278b1cbcc6e8601
Message ID: <9402060811.AA24965@acacia.itd.uts.EDU.AU>
Reply To: <9402052233.AA04867@toad.com>
UTC Datetime: 1994-02-06 08:10:24 UTC
Raw Date: Sun, 6 Feb 94 00:10:24 PST

Raw message

From: mgream@acacia.itd.uts.edu.au (Matthew Gream)
Date: Sun, 6 Feb 94 00:10:24 PST
To: cypherpunks@toad.com
Subject: Re: Some stuff about Diffie-Hellman (and more :-)
In-Reply-To: <9402052233.AA04867@toad.com>
Message-ID: <9402060811.AA24965@acacia.itd.uts.EDU.AU>
MIME-Version: 1.0
Content-Type: text/plain


Earlier, smb@research.att.com wrote:

> There's also Rivest and Shamir's Interlock Protocol (April '84 CACM).
> Davies and Price suggest using it for authentication, but Mike Merritt
> and I showed that that doesn't work under certain circumstances.

Diffie, Wiener et al in "Authentication and Authenticated Key Exchanges"
(Designs, Codes and Cryptography, 2, 1992) discuss the need to combine key 
exchange and authentication, amongst other things. Anyway, the upshot is 
that a Station To Station protocol is developed and discussed which is 
based on the original D-H system. Damn, I don't have the paper which me,
so I'm not sure whether third party certification is needed.

The accompanying discussion, relating to secure protocol requirements and 
so on struck me as quite good at the time IMHO.

Matthew.
-- 
Matthew Gream, ph: (02)-821-2043
	M.Gream@uts.edu.au.





Thread