Scare tactic?
Ivan Krstić
krstic at solarsail.hcs.harvard.edu
Thu Sep 20 08:08:32 EDT 2007
On Sep 19, 2007, at 5:01 PM, Nash Foster wrote:
> Any actual cryptographers care to comment on this? I don't feel
> qualified to judge.
If the affected software is doing DH with a malicious/compromised
peer, the peer can make it arrive at a predictable secret -- which
would be known to some passive listener. But hey, if the peer is
malicious or compromised to begin with, it could just as well do DH
normally and explicitly send the secret to the listener when it's
done. Not much to see here.
--
Ivan Krstić <krstic at solarsail.hcs.harvard.edu> | http://radian.org
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list