From: “Perry E. Metzger” <perry@imsi.com>
To: cypherpunks@toad.com
Message Hash: f7424f586fad40ac9c561ac068ee953428af0d35003567bc0a50bb872bbd9f00
Message ID: <9406031254.AA03892@snark.imsi.com>
Reply To: <9406031201.AA03789@snark.imsi.com>
UTC Datetime: 1994-06-03 12:55:30 UTC
Raw Date: Fri, 3 Jun 94 05:55:30 PDT
From: "Perry E. Metzger" <perry@imsi.com>
Date: Fri, 3 Jun 94 05:55:30 PDT
To: cypherpunks@toad.com
Subject: Re: Black Eye for NSA, NIST, and Denning
In-Reply-To: <9406031201.AA03789@snark.imsi.com>
Message-ID: <9406031254.AA03892@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
"Perry E. Metzger" says:
> However, it can be done in advance, and you can conceivably reuse
> forged LEAFs.
I will point out something that I didn't quite understand myself but
have since discussed with Matt Blaze in some detail -- LEAF checksums
are tied to session keys. You CAN do this in advance but only if your
key exchange will permit you to generate your session keys in advance,
too. Obviously, reusing forged LEAFs requrire requires reusing sesison
keys.
Perry
Return to June 1994
Return to “Phil Karn <karn@qualcomm.com>”