From: cort <cort@ecn.purdue.edu>
To: jrochkin@cs.oberlin.edu (Jonathan Rochkind)
Message Hash: a5204a5d57ee0d31be1a46123e430a2bf828e6dad6af1f3fa91d1a2daa67e800
Message ID: <199407080255.VAA24461@en.ecn.purdue.edu>
Reply To: <199407080132.VAA14746@cs.oberlin.edu>
UTC Datetime: 1994-07-08 02:55:45 UTC
Raw Date: Thu, 7 Jul 94 19:55:45 PDT
From: cort <cort@ecn.purdue.edu>
Date: Thu, 7 Jul 94 19:55:45 PDT
To: jrochkin@cs.oberlin.edu (Jonathan Rochkind)
Subject: Re: Question: Key Distr. in realtimeo applications?
In-Reply-To: <199407080132.VAA14746@cs.oberlin.edu>
Message-ID: <199407080255.VAA24461@en.ecn.purdue.edu>
MIME-Version: 1.0
Content-Type: text
> If so, how is this key distributed to both participants?
Find Diffie-Hellman in your Schneier.
D-H is a fundamental (in the sense of foundations) protocol which
transmits information "invisibly" (mathematically speaking).
For related invisibility, read about the Dining Cryptographers.
Cort.
Return to July 1994
Return to “Jonathan Rochkind <jrochkin@cs.oberlin.edu>”