John,
Do your parties have any shared secret information?
If they share a cryptographic key, they can use a
simple hash-based challenge/response protocol.
If the have shared passwords or any other small
secrets, they can use EKE or SPEKE.
There are lots of neat tricks that might be
R. A. Hettinga writes:
http://www.law.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?pagename=law/Viewc=Articlecid=ZZZU66KQBZClive=truecst=1pc=0pa=0s=NewsExpIgnore=trueshowsummary=0
March 28, 2002
DMCA Still Faces Its First Criminal Test
Criminal case will test Digital Copyright
On Fri, 29 Mar 2002, Adam Back wrote:
Any takers on ciphersaber-2 test vectors which are also topical
and amusing english phrases?
Is there a faster way to search the test vector space than brute
force? Only certain output values from the PRNG will transform
alphanumeric characters into other
On Sat, Mar 30, 2002 at 08:27:02AM -0800, Jeff Cours wrote:
On Fri, 29 Mar 2002, Adam Back wrote:
Any takers on ciphersaber-2 test vectors which are also topical
and amusing english phrases?
Is there a faster way to search the test vector space than brute
force? Only certain output