1996-02-07 - Re: POTP gets good press

Header Data

From: Simon Spero <ses@tipper.oit.unc.edu>
To: bryce@colorado.edu
Message Hash: c9b7bfb6081e61624e515e869c0f53ed402a519e04f00d2befc043a39fffa53e
Message ID: <Pine.SOL.3.91.960207131830.2562B-100000@chivalry>
Reply To: <199602071956.MAA17880@nagina.cs.colorado.edu>
UTC Datetime: 1996-02-07 21:47:34 UTC
Raw Date: Thu, 8 Feb 1996 05:47:34 +0800

Raw message

From: Simon Spero <ses@tipper.oit.unc.edu>
Date: Thu, 8 Feb 1996 05:47:34 +0800
To: bryce@colorado.edu
Subject: Re: POTP gets good press
In-Reply-To: <199602071956.MAA17880@nagina.cs.colorado.edu>
Message-ID: <Pine.SOL.3.91.960207131830.2562B-100000@chivalry>
MIME-Version: 1.0
Content-Type: text/plain


On Wed, 7 Feb 1996, Bryce wrote:

> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> Content:  includes diagrams entitled "Link Level Encryption"
> in which sender transmits keys to receiver, and "Packet
> Level Encryption" in which sender transmits key sto
> certificate authority which transmits them to multiple
> receivers, and "Synchronized Random Key Generation (SRKG)" 
> 
> Am I right in thinking this is utter unmitigated
> bullsh snake oil?  Does anybody have any other

It could be doing something SKIP like; if the certificates are DH certs, 
it could be using those to generate a shared secret, and combing that 
with an IV to generate a key.

hard to tell from the article

Simon





Thread