1995-02-06 - Re: The SKRONK protocols (version 0.6)

Header Data

From: strick – henry strickland <strick@versant.com>
To: Network Security Observations <NSO@delphi.com>
Message Hash: 0ba08d63d316725ad53745ee7cfbb73a067bd345634c5fcaf5c1a763dd6bbafd
Message ID: <9502060806.AA07087@versant.com>
Reply To: <01HMPOWDUA1M91MP0I@delphi.com>
UTC Datetime: 1995-02-06 08:04:41 UTC
Raw Date: Mon, 6 Feb 95 00:04:41 PST

Raw message

From: strick -- henry strickland <strick@versant.com>
Date: Mon, 6 Feb 95 00:04:41 PST
To: Network Security Observations <NSO@delphi.com>
Subject: Re: The SKRONK protocols (version 0.6)
In-Reply-To: <01HMPOWDUA1M91MP0I@delphi.com>
Message-ID: <9502060806.AA07087@versant.com>
MIME-Version: 1.0
Content-Type: text/plain


THUS SPAKE Network Security Observations <NSO@delphi.com>:
# Henry,
# I would like to publish the working doc. in the next available issue 

Go ahead; I place the document in the public domain.

# of Internet Security Monthly. Obviously with a request to respond.

It would be kind if you sent me a copy of the issues that discuss it.
I'm not familiar with the journal.  If it's on paper, ask for my USPS address.

# Do you have any further material that you prefer to go along with it ?

Nope, that says what I have to say right now.  

The followup discussion on Cypherpunks has been helpful to me;
the punks mostly made good points and correct observations.  


		best regards, strick






Thread