From: Carl Ellison <cme@TIS.COM>
To: hfinney@shell.portal.com
Message Hash: 21278a9afcabc05146fd525f1a352c249b6e69a692ac217c07e3def26d722551
Message ID: <9510291444.AA24504@tis.com>
Reply To: N/A
UTC Datetime: 1995-10-29 14:58:26 UTC
Raw Date: Sun, 29 Oct 1995 22:58:26 +0800
From: Carl Ellison <cme@TIS.COM>
Date: Sun, 29 Oct 1995 22:58:26 +0800
To: hfinney@shell.portal.com
Subject: Re: Human ID through insecure channel
Message-ID: <9510291444.AA24504@tis.com>
MIME-Version: 1.0
Content-Type: text/plain
>Date: Mon, 16 Oct 1995 13:51:27 -0700
>From: Hal <hfinney@shell.portal.com>
>Subject: Human ID through insecure channel
>
>Here is an example of the Matsumoto/Imai scheme for identifying yourself
>via a shared secret over an insecure channel, a system which is simple
>enough to be done in your head but which can withstand repeated
>observations by an adversary without being broken.
Hal,
has this been written up someplace where I might read their
description?
From your description of it, I have a way to break it in O(N)
samples, where N is the number of characters in the challenge string and
the factor of proportionality is strictly a function of how sure you want
to be that you have a correct break.
- Carl
+--------------------------------------------------------------------------+
|Carl M. Ellison cme@tis.com http://www.clark.net/pub/cme |
|Trusted Information Systems, Inc. http://www.tis.com/ |
|3060 Washington Road PGP 2.6.2: 61E2DE7FCB9D7984E9C8048BA63221A2|
|Glenwood MD 21738 Tel:(301)854-6889 FAX:(301)854-5363 |
+--------------------------------------------------------------------------+
Return to October 1995
Return to “Carl Ellison <cme@TIS.COM>”
1995-10-29 (Sun, 29 Oct 1995 22:58:26 +0800) - Re: Human ID through insecure channel - Carl Ellison <cme@TIS.COM>