1998-09-21 - Re: ArcotSign (was Re: Does security depend on hardware?)

Header Data

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Bruce Schneier <schneier@counterpane.com>
Message Hash: 97f24b20d3e89d3cb3eec751d5651f1b09dac9f610f8fef7e578e8b75d2e2190
Message ID: <36078061.D34D26D@stud.uni-muenchen.de>
Reply To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
UTC Datetime: 1998-09-21 22:06:11 UTC
Raw Date: Tue, 22 Sep 1998 06:06:11 +0800

Raw message

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 06:06:11 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36078061.D34D26D@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Bruce Schneier wrote:
> 
> At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote:

> >A question : How does the legitimate user find his password?
> >(Sorry for not having followed this thread from the beginning.)
> 
> He uses a remembered secret and some mathematical magic.

Another naive question: Why is the remembered secret not sufficient
(thus doing away with the magic)?

M. K. Shen





Thread