From: “strick – strick AT versant DOT com – henry strickland” <strick@osc.versant.com>
To: bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
Message Hash: bf1c372f54c27d850c07b720c2364900e4585f1b8f34a8b2e6c1d44be1b40641
Message ID: <9402161704.AA05067@osc.versant.com>
Reply To: <9402160417.AA09448@anchor.ho.att.com>
UTC Datetime: 1994-02-16 17:05:09 UTC
Raw Date: Wed, 16 Feb 94 09:05:09 PST
From: "strick -- strick AT versant DOT com -- henry strickland" <strick@osc.versant.com>
Date: Wed, 16 Feb 94 09:05:09 PST
To: bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
Subject: Re: ITAR vs. Diffie-Hellman Key Exchange?
In-Reply-To: <9402160417.AA09448@anchor.ho.att.com>
Message-ID: <9402161704.AA05067@osc.versant.com>
MIME-Version: 1.0
Content-Type: text/plain
# From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com
#
# However, is Diffie-Hellman exportable? After all, it's not crypto,
# it's *just* key exchange,
For that matter, the trivial use of the Dining Cryptographers algorithm
really doesn't involve anything I consider True Crypto: it's just
coin flips and xors -- more of an "encoding" than an "encryption".
Notice there is no encryption/decryption key. As in DH, the information
emerges in the end if you follow the protocol.
# be an updated RSAREF version including Diffie-Hellman key exchange,
Try writing to burt@rsa.com and asking for it. They sent it to me. strick
Return to February 1994
Return to “wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)”