[17000] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: I'll show you mine if you show me, er, mine

daemon@ATHENA.MIT.EDU (Arash Partow)
Thu Mar 3 19:21:35 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu,  3 Mar 2005 13:07:32 -0800
From: Arash Partow <arash@partow.net>
To: cryptography@metzdowd.com
In-Reply-To: <p0611042abe42a7c46e28@[68.167.57.91]>


Reading the description from http://www.stealth-attacks.info/, it
seems that Peter might be right. I think this is just a re-hash of
already well established ideas.

In the case of a sending the password back to B, its a very similar
scenario to scene III where Athena suggests to Euripides that the
ticket life-time be once off (once use), Euripides goes "it would
make using services on the network too difficult why not give it a
time stamp for the duration of the person's work day" - a ticket
generating ticket. The play goes on from there, in the end "Charon"
which is then quickly renamed "Kerberos" is made. Then 1988 now 2005,
I would say thats about 13 years... :)


Name of play is "Designing An Authentication System: A Dialogue In Four Scence" by Bill Bryant



Arash
________________________________________________________
Be one who knows what they don't know,
Instead of being one who knows not what they don't know,
Thinking they know everything about all things.
http://www.partow.net




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post