From: Hal <hfinney@shell.portal.com>
To: cypherpunks@toad.com
Message Hash: 1da2c79338c700e3f593b619620666aa3b27b79f3247b070b4fb45ccb4193d62
Message ID: <199405202112.OAA18261@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1994-05-20 21:11:20 UTC
Raw Date: Fri, 20 May 94 14:11:20 PDT
From: Hal <hfinney@shell.portal.com>
Date: Fri, 20 May 94 14:11:20 PDT
To: cypherpunks@toad.com
Subject: Re: D-H key exchange - how does it work?
Message-ID: <199405202112.OAA18261@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain
From: hughes@ah.com (Eric Hughes)
> > In addition, changing the modulus can have unpleasant effects on
> > traffic analysis, if not done properly.
>
> Of what sort?
>
> For D-H, the modulus must be transmitted in the clear. Unless you use
> a different modulus for each conversation, there is a persistency to
> the moduli that gives rise to a pseudo-identity.
I don't follow this. If you never change the modulus (which is what it
sounds like Eric was recommending), then isn't there an even greater
persistency? Or is it the assumption that everyone uses the same modulus
in that case?
Hal
Return to May 1994
Return to “hughes@ah.com (Eric Hughes)”