I'll show you mine if you show me, er, mine

Jerrold Leichter jerrold.leichter at smarts.com
Thu Mar 3 17:31:28 EST 2005


| >Briefly, it works like this: point A transmits an encrypted message to point
| >B. Point B can decrypt this, if it knows the password. The decrypted text is
| >then sent back to point A, which can verify the decryption, and confirm that
| >point B really does know point A's password. Point A then sends the password
| >to point B to confirm that it really is point A, and knows its own password.
| 
| Isn't this a Crypto 101 mutual authentication mechanism (or at least a
| somewhat broken reinvention of such)?...

The description has virtually nothing to do with the actual algorithm 
proposed.  Follow the link in the article - http://www.stealth-attacks.info/ - 
for an actual - if informal - description.

							-- Jerry


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list