From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Bruce Schneier <schneier@counterpane.com>
Message Hash: 97f24b20d3e89d3cb3eec751d5651f1b09dac9f610f8fef7e578e8b75d2e2190
Message ID: <36078061.D34D26D@stud.uni-muenchen.de>
Reply To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
UTC Datetime: 1998-09-21 22:06:11 UTC
Raw Date: Tue, 22 Sep 1998 06:06:11 +0800
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 06:06:11 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36078061.D34D26D@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain
Bruce Schneier wrote:
>
> At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote:
> >A question : How does the legitimate user find his password?
> >(Sorry for not having followed this thread from the beginning.)
>
> He uses a remembered secret and some mathematical magic.
Another naive question: Why is the remembered secret not sufficient
(thus doing away with the magic)?
M. K. Shen
Return to September 1998
Return to ““Todd S. Glassey” <TSGman@earthlink.net>”