1996-03-13 - Re: Remailer passphrases

Header Data

From: Simon Spero <ses@tipper.oit.unc.edu>
To: “Perry E. Metzger” <perry@piermont.com>
Message Hash: 4c33f045e597b192323d043f42c07e24de555fa3e7591feeceb7dc986f54cdcb
Message ID: <Pine.SOL.3.91.960312140002.390D-100000@chivalry>
Reply To: <199603121951.OAA02237@jekyll.piermont.com>
UTC Datetime: 1996-03-13 21:52:55 UTC
Raw Date: Thu, 14 Mar 1996 05:52:55 +0800

Raw message

From: Simon Spero <ses@tipper.oit.unc.edu>
Date: Thu, 14 Mar 1996 05:52:55 +0800
To: "Perry E. Metzger" <perry@piermont.com>
Subject: Re: Remailer passphrases
In-Reply-To: <199603121951.OAA02237@jekyll.piermont.com>
Message-ID: <Pine.SOL.3.91.960312140002.390D-100000@chivalry>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 12 Mar 1996, Perry E. Metzger wrote:

> 
> Signed Diffie-Hellman key exchanges have the property known as
> "Perfect Forward Secrecy". Even if the opponent gets your public keys


Just to clarify Perry's statement- Diffie-Helman key exchanges can 
provide Perfect forward secrecy if fresh parameters are used each time- 
protocols like the old version of SKIP, which do not use fresh paramaters 
each time, do not provide perfect forward secrecy.

Simon

---
They say in  online country             So which side are you on boys
There is no middle way                  Which side are you on
You'll either be a Usenet man           Which side are you on boys
Or a thug for the CDA                   Which side are you on?
  National Union of Computer Operatives; Hackers, local 37   APL-CPIO






Thread