1995-02-01 - Re: ESP Unix encrypted session protocol software

Header Data

From: Thomas Grant Edwards <tedwards@src.umd.edu>
To: Eric Hughes <eric@remailer.net>
Message Hash: c5a409653c9e9cc0ac51d4feba5f5c58520f2d45117ee8b767ebed9c62fb9e92
Message ID: <Pine.SUN.3.91.950201020755.4492A-100000@reggae.src.umd.edu>
Reply To: <199502010527.VAA04897@largo.remailer.net>
UTC Datetime: 1995-02-01 07:49:33 UTC
Raw Date: Tue, 31 Jan 95 23:49:33 PST

Raw message

From: Thomas Grant Edwards <tedwards@src.umd.edu>
Date: Tue, 31 Jan 95 23:49:33 PST
To: Eric Hughes <eric@remailer.net>
Subject: Re: ESP Unix encrypted session protocol software
In-Reply-To: <199502010527.VAA04897@largo.remailer.net>
Message-ID: <Pine.SUN.3.91.950201020755.4492A-100000@reggae.src.umd.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 31 Jan 1995, Eric Hughes wrote:

> Just because plain old Diffie Hellman is subject to active attack
> doesn't mean it's useless.  Some protection is better than no
> protection at all.  It's still worthwhile implementing some security
> to make an opponent's task harder than to implement no security.

I'm curious though if there is some way to reduce the risk or at least 
increase the detectability of active DH spoofing.   I am thinking of the 
use of a trusted adjudicator who could receive information from both the 
original participants and check to see if the two keys matched.

Does anyone see a good solution to this problem?

-Thomas







Thread