[103217] in Cypherpunks
Re: ArcotSign (was Re: Does security depend on hardware?)
daemon@ATHENA.MIT.EDU (Mok-Kong Shen)
Tue Sep 22 07:25:52 1998
Date: Tue, 22 Sep 1998 12:48:01 +0100
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Bruce Schneier <schneier@counterpane.com>
CC: cryptography@c2.net, cypherpunks@algebra.com, coderpunks@toad.com
Reply-To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Bruce Schneier wrote:
>
> At 08:59 AM 9/22/98 +0100, Mok-Kong Shen wrote:
> >A question : How does the legitimate user find his password?
> >(Sorry for not having followed this thread from the beginning.)
>
> He uses a remembered secret and some mathematical magic.
Another naive question: Why is the remembered secret not sufficient
(thus doing away with the magic)?
M. K. Shen