[17002] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: I'll show you mine if you show me, er, mine

daemon@ATHENA.MIT.EDU (Jerrold Leichter)
Thu Mar 3 19:23:51 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 3 Mar 2005 17:31:28 -0500 (EST)
From: Jerrold Leichter <jerrold.leichter@smarts.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
Cc: cryptography@metzdowd.com, cypherpunks@al-qaeda.net,
	rah@shipwright.com
In-Reply-To: <E1D3waI-0003TA-00@medusa01.cs.auckland.ac.nz>

| >Briefly, it works like this: point A transmits an encrypted message to point
| >B. Point B can decrypt this, if it knows the password. The decrypted text is
| >then sent back to point A, which can verify the decryption, and confirm that
| >point B really does know point A's password. Point A then sends the password
| >to point B to confirm that it really is point A, and knows its own password.
| 
| Isn't this a Crypto 101 mutual authentication mechanism (or at least a
| somewhat broken reinvention of such)?...

The description has virtually nothing to do with the actual algorithm 
proposed.  Follow the link in the article - http://www.stealth-attacks.info/ - 
for an actual - if informal - description.

							-- Jerry


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post