[9782] in cryptography@c2.net mail archive
Re: when a fraud is a sale, Re: Rubber hose attack
daemon@ATHENA.MIT.EDU (JohnE37179@aol.com)
Mon Nov 5 15:44:09 2001
From: JohnE37179@aol.com
Message-ID: <cc.12fd4f5.2918274b@aol.com>
Date: Mon, 5 Nov 2001 12:32:59 EST
To: rick_smith@securecomputing.com, JohnE37179@aol.com,
egerck@nma.com
Cc: lynn.wheeler@firstdata.com, cryptography@wasabisystems.com,
Jason.Gruber@btinternet.com, vertigo@panix.com
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
In a message dated 11/5/01 11:28:57 AM, rick_smith@securecomputing.com writes:
<< then
you can only 'authenticate' between entities that share some
fairly complex secret information. Anything else can be spoofed
pretty easily. >>
The information does not have to be secret at all. It can be open, but not
capable of being duplicated. Could any of your friends fool your mother that
they were you?
John
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com