From: iagoldbe@calum.csclub.uwaterloo.ca (Ian Goldberg)
To: cypherpunks@toad.com
Message Hash: 6978bb865da78ea6ffc4e05d1d5e69149d095978794d2a31287b4ebe6d2075f0
Message ID: <4e3von$8ut@calum.csclub.uwaterloo.ca>
Reply To: <199601221635.RAA13080@digicash.com>
UTC Datetime: 1996-01-24 09:34:25 UTC
Raw Date: Wed, 24 Jan 1996 17:34:25 +0800
From: iagoldbe@calum.csclub.uwaterloo.ca (Ian Goldberg)
Date: Wed, 24 Jan 1996 17:34:25 +0800
To: cypherpunks@toad.com
Subject: Re: DigiCash Ecash - 2 security topics
In-Reply-To: <199601221635.RAA13080@digicash.com>
Message-ID: <4e3von$8ut@calum.csclub.uwaterloo.ca>
MIME-Version: 1.0
Content-Type: text/plain
>> > E.g. has there been a DigiCash response to Ian Goldberg's
>> > publication of a denial-of-service attack which operates by
>> > spending a coin with the same serial number as your victim's
>> > coin?
>> After discussing things with Ian we came up with several solutions.
>> One is encrypting more messages (which we will do in a next revision
>> of the protocol), the other is enabling ecash to work over ssl
>> servers. You may not see the answer directly in the list, but you
>> will see it in the next protocol revision.
Actually, my original suggestion was to include 'n' in the value encrypted
in the bank's public key. The less we have to _rely_ on ecash-enabled
apps having to do their own encryption (like SSL), the better.
Of course, extra encryption is OK, too.
I wonder if Dave and I will get Digicash's reward for this one...
I still haven't seen anything from them (though various individuals keep
promising), or from Netscape either, for that matter... [emoticon elided]
- Ian "starving grad student (sigh)"
Return to January 1996
Return to “iagoldbe@calum.csclub.uwaterloo.ca (Ian Goldberg)”
Unknown thread root