[5143] in cryptography@c2.net mail archive
secure (proactive?) clock synchronization
daemon@ATHENA.MIT.EDU (amir.herzberg@il.ibm.com)
Mon Jul 19 13:20:14 1999
From: amir.herzberg@il.ibm.com
To: cryptography@c2.net
Date: Mon, 19 Jul 1999 08:51:47 +0300
We've been recently working on what seems like a neat new clock
synchronization protocol, which will hopefully offer proactive security
(recovery from penetrations, see http://www.hrl.il.ibm.com/proactive).
Surprisingly, it also appears a very practical protocol. It has been some
time since I last worked on clock synchronization, so I wonder, what is the
state of the art - practical protocols (any substantially change in NTP
recently or any serious alternative), and protocols designed to withstand
attackers (of course I'll be esp. interested if there's anything with some
recovery properties!!).
Thanks for any pointers.
Best Regards,
Amir Herzberg
Manager, E-Business and Security Technologies
IBM Research - Haifa Lab (Tel Aviv Office)
http://www.hrl.il.ibm.com
New e-mail: amir@il.ibm.com
New Lotus notes mail: amir herzberg/haifa/ibm@IBMIL