[14537] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: anonymous DH & MITM

daemon@ATHENA.MIT.EDU (Ian Grigg)
Mon Oct 6 16:03:49 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 06 Oct 2003 15:38:37 -0400
From: Ian Grigg <iang@systemics.com>
Reply-To: iang@systemics.com
To: Taral <taral@taral.net>
Cc: Cryptography list <cryptography@metzdowd.com>

Taral wrote:
> 
> On Mon, Oct 06, 2003 at 11:43:21AM -0400, Anton Stiglic wrote:
> > You started by talking about anonymous communication, but ended up
> > suggesting a scheme for pseudonymous communication.
> >
> > Anonymous != pseudonymous.
> >
> > Let us be clear on that!
> > It is an important difference.
> 
> Yes it is. An anonymous system can be constructed from a pseudonymous
> system by never reusing a pseudonym.

True, I think!  Is there a practical application for this?

( I can think of one trivial example: "a message system is
psuedonymous, but I want to send an anonymous message!" )

I'm asking myself whether "anonymous DH" is confusingly named.
Perhaps it should be called psuedonymous DH because it creates
psuedonyms for the life of the session?  Or, we need a name
that describes the creation of psuedonyms, de novo, from
an anonymous starting position?

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post