[120946] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: 2factor

daemon@ATHENA.MIT.EDU (mheyman@gmail.com)
Fri Apr 18 16:49:04 2008

Date: Wed, 16 Apr 2008 14:07:49 -0400
From: "mheyman@gmail.com" <mheyman@gmail.com>
To: "Leichter, Jerry" <leichter_jerrold@emc.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <Pine.SOL.4.61.0804091255220.5804@mental>

On Wed, Apr 9, 2008 at 12:59 PM, Leichter, Jerry
<leichter_jerrold@emc.com> wrote:
> Anyone know anything about a company called 2factor (2factor.com)?
> They're pushing a system based on symmetric cryptography with, it
> appears, some kind of trusted authority.  "Factor of 100 faster
> than SSL".  "More secure, because it authenticates every message."
>
> No real technical data I can find on the site, and I've never seen
> a site with so little information about who's involved.  (Typically,
> you at least get a list of the top execs.)  Some ex-spooks?  Pure
> snake oil?  Somewhere in between?
>
More googling and this seems to be the technology:

<http://www.wipo.int/pctdb/en/wo.jsp?wo=2008030523>
and
<http://www.freshpatents.com/Method-and-system-for-performing-perfectly-secure-key-exchange-and-authenticated-messaging-dt20060216ptan20060034456.php>

Which seem to be aimed at a drop in replacement for SSL (with a
working example using Firefox and Apache). They seem to rest on a key
exchange or agreement based on  a shared secret. Take this analysis
with a grain of salt - I just gave the patent and application a quick
scan.

-Michael Heyman

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post