1997-10-07 - Re: Secure phone

Header Data

From: Bill Frantz <frantz@netcom.com>
To: Adam Back <aba@dcs.ex.ac.uk>
Message Hash: 63658b22df124ad23255f02a446a52446633f208da754241e090a4432a1e94d5
Message ID: <v03007854b05f68b312e4@[207.94.249.144]>
Reply To: <v0300784db05ec180b158@[207.94.249.144]>
UTC Datetime: 1997-10-07 06:52:45 UTC
Raw Date: Tue, 7 Oct 1997 14:52:45 +0800

Raw message

From: Bill Frantz <frantz@netcom.com>
Date: Tue, 7 Oct 1997 14:52:45 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Secure phone
In-Reply-To: <v0300784db05ec180b158@[207.94.249.144]>
Message-ID: <v03007854b05f68b312e4@[207.94.249.144]>
MIME-Version: 1.0
Content-Type: text/plain



At 10:57 AM -0700 10/6/97, Adam Back wrote:
>Bill Frantz <frantz@netcom.com> writes:
>> At 6:25 PM -0700 10/5/97, Adam Back wrote:
>> >On the other hand, using persistent key public key crypto, Tim has
>> >been signing his posts recently, and I have an ancient public key of
>> >his stashed away which his new key is signed with.  If we were able to
>> >construct a protocol to bolt on top of the reading of hashes, we could
>> >have much greater protection against MITM.
>>
>> Of course if you can use PGP as well as the secure phone, you can use PGP
>> to exchange a pad of one-time passwords.
>
>The passwords alone don't do you any good: if you read them out over
>the phone, Eve can just repeat them.

One simple possibility is to send out ten word groups.  Use each group only
once.  Use the words to encode the key hash display.


-------------------------------------------------------------------------
Bill Frantz       | Internal surveillance      | Periwinkle -- Consulting
(408)356-8506     | helped make the USSR the   | 16345 Englewood Ave.
frantz@netcom.com | nation it is today.        | Los Gatos, CA 95032, USA







Thread