Kahli R. Burke wrote: > I have a copy you can borrow. Why don't you email off the list and we > can arrange the drop. Wait a minute...are we in some spy movie? > > Me (aka 003): I like the cheescake at this joint... > Bob (aka 0775): Yeah, *strawberry* is my favorite flavor. > Me: Alright, you know the password, I guess you must be the guy. Here > are the cryptographic algorithms. Remember, we can't let these fall > into the wrong hands. Good luck soldier, we're all depending on you. > Bob (grabs fork): Are you going to finish that piece?
We could use anonymous Diffie-Hellman authentication to establish a secure comm channel with no prior knowledge. But I'd need to look it up in Applied Cryptography... Want to lend me your copy so I can look it up so I can contact you to arrange to borrow it?? -- Bob Miller K<bob> kbobsoft software consulting http://kbobsoft.com [EMAIL PROTECTED] _______________________________________________ Eug-LUG mailing list [EMAIL PROTECTED] http://mailman.efn.org/cgi-bin/listinfo/eug-lug
