On Fri, Sep 26, 2003 at 06:26:16PM -0700, Joseph Ashwood wrote: > > First, keys for the > > symmetric cipher encryption are exchanged. Mallet cannot decrypt keys he > > gets from Bob and Alice, because he doesn't have their private keys. > But he does, he spoofed each connection and acted as initiator for both,
Presuming that Bob and Alice have previously exchanged correct public keys, how does he do that? -- Kent Crispin "Be good, and you will be [EMAIL PROTECTED],[EMAIL PROTECTED] lonesome." p: +1 310 823 9358 f: +1 310 823 8649 -- Mark Twain --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]