James A. Donald said:
There seem to be a shitload of protocols, in addition to SPEKE
and DH-EKE
...
Can anyone suggest a well reviewed, unpatented, protocol that
has the desired properties?
Unpatented will be your biggest hurdle.
I collaborated on the development of a strong password protocol
either party to
send the password itself at the end.
William
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, February 23, 2005 7:30 AM
To: cryptography@metzdowd.com; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: I'll show you mine if you
http://www.theregister.co.uk/2005/02/21/crypto_wireless/print.html
The Register
Biting the hand that feeds IT
The Register » Security » Identity »
Original URL: http://www.theregister.co.uk/2005/02/21/crypto_wireless/
I'll show you mine if you show me, er, mine
By Lucy Sherriff
--
On 24 Feb 2005 at 2:29, Peter Gutmann wrote:
Isn't this a Crypto 101 mutual authentication mechanism (or
at least a somewhat broken reinvention of such)? If the
exchange to prove knowledge of the PW has already been
performed, why does A need to send the PW to B in the last
step? You
--- begin forwarded text
To: [EMAIL PROTECTED]
Subject: Re: I'll show you mine if you show me, er, mine
Date: Wed, 23 Feb 2005 12:14:04 -0800 (PST)
From: [EMAIL PROTECTED] (Hal Finney)
Sender: [EMAIL PROTECTED]
Markus Jakobsson is a really smart guy who's done some cool stuff, so I
think
Reading the description from http://www.stealth-attacks.info/, it
seems that Peter might be right. I think this is just a re-hash of
already well established ideas.
In the case of a sending the password back to B, its a very similar
scenario to scene III where Athena suggests to Euripides that