On 5/2/06, Nick Mathewson [EMAIL PROTECTED] wrote:
On Tue, May 02, 2006 at 07:07:56PM -0400, Watson Ladd wrote: First some background: The NSA's Suit B uses a key negotiation mutual authentication method MQV. This method was found to be insecure, and so HMQV was created. HMQV uses a
signature
First some background:The NSA's Suit B uses a key negotiation mutual authentication method MQV. This method was found to be insecure, and so HMQV was created. HMQV uses a signature protocol called HCR twice in one exchange to generate a key. HCR can prove identy of one endpoint and negotiate a key
On Tue, May 02, 2006 at 07:07:56PM -0400, Watson Ladd wrote:
First some background:
The NSA's Suit B uses a key negotiation mutual authentication method MQV.
This method was found to be insecure, and so HMQV was created. HMQV uses a
signature protocol called HCR twice in one exchange to
3 matches
Mail list logo