On Fri, Sep 26, 2003 at 06:26:16PM -0700, Joseph Ashwood wrote:
> > First, keys for the
> > symmetric cipher encryption are exchanged. Mallet cannot decrypt keys he
> > gets from Bob and Alice, because he doesn't have their private keys.
> But he does, he spoofed each connection and acted as initiator for both,

Presuming that Bob and Alice have previously exchanged correct public
keys, how does he do that?

-- 
Kent Crispin                               "Be good, and you will be
[EMAIL PROTECTED],[EMAIL PROTECTED]         lonesome."
p: +1 310 823 9358  f: +1 310 823 8649               -- Mark Twain

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to