[388] in Kerberos

home help back first fref pref prev next nref lref last post

Re: faster encrypted rlogin

daemon@TELECOM.MIT.EDU (Steve Miller)
Mon Jun 6 15:16:23 1988

From: miller%erlang.DEC@DECWRL.DEC.COM (Steve Miller)
To: kerberos@ATHENA.MIT.EDU, MILLER%erlang.DEC@DECWRL.DEC.COM

Ken and Jeff's suggestion sounds like a variation on a Vernam cipher,
or one-time-pad. A true random bit stream used as the XOR is uncrackable,
if used only once, and is used for the highest security level communications.
So the question is to make sure you get a good pseudo-random stream from
the DES seed, and don't reuse it.  The reuse is a problem with Kerberos,
since the Session key is valid for some considerable time -- actually
can be multiple sessions.

You could use the DES output feedback (OFB) mode to produce the bit stream,
or even better, according to our crypto guru, just use a counter that
doesn't wrap, e.g. >=32 bits, and encrypt the counter.

Let me know how it works out.

Steve.

home help back first fref pref prev next nref lref last post