Kahli R. Burke wrote:

> I have a copy you can borrow.  Why don't you email off the list and we 
> can arrange the drop.  Wait a minute...are we in some spy movie?
> 
> Me (aka 003): I like the cheescake at this joint...
> Bob (aka 0775): Yeah, *strawberry* is my favorite flavor.
> Me: Alright, you know the password, I guess you must be the guy.  Here 
> are the cryptographic algorithms.  Remember, we can't let these fall 
> into the wrong hands.  Good luck soldier, we're all depending on you.
> Bob (grabs fork): Are you going to finish that piece?

We could use anonymous Diffie-Hellman authentication to establish a
secure comm channel with no prior knowledge.  But I'd need to look it
up in Applied Cryptography...  Want to lend me your copy so I can look
it up so I can contact you to arrange to borrow it??

-- 
Bob Miller                              K<bob>
kbobsoft software consulting
http://kbobsoft.com                     [EMAIL PROTECTED]
_______________________________________________
Eug-LUG mailing list
[EMAIL PROTECTED]
http://mailman.efn.org/cgi-bin/listinfo/eug-lug

Reply via email to