--
At 12:15 PM 7/22/2000 -0700, [EMAIL PROTECTED] wrote:
> You could have a slightly simpler system by just letting G^q be the
> user's public key,
Which gives the server unlimited power to read the users mail and
impersonate the user, even if the user is using a high entropy passphrase.
> It's a little unclear what your security model is, whether the
> client is trusted or not.
That is because I am looking for both belt and braces to keep the users
pants up.
I want a system that is invulnerable to outsiders who have no knowledge of
the passphrase and infrequent and limited access to the user's machine and
no power over the server, even if the user chooses a weak passphrase, and a
system that is also invulnerable to outsiders with power over the server if
the user chooses a strong passphrase and they have no access to the user's
machine.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
fBygsLvIO8PYdMDoivJRJg6J1OvIXDR+USrBa0Ou
4HRCExGCubrGiwhyIUJmf2QkOYOTYuvZsh/AXJjyA