A shared secret is all secure magnesium.
I file with random numbers shared by host A and B,send only ones
or make the first Public key secret.
A: Random num. || Date || Public key
1) 624672577272 || 1999-06-23 || RSA key1- Public A (a secret)
2) 456466461725 1999-06-24 RSA Key2
3) 747484744927 1999-06-25
B:
1) 624672577272
2) 456466461725
3) 747484744927
----------
> From: ryanm <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
> Subject: Authentication Schemes
> Date: Tuesday, June 22, 1999 9:39 PM
>
> Hello Security experts,
>
> I am curious what different authentication schemes exist for
> proving who someone( Workstation ) or something is. I have used
> RSA auth in the past. What else can be used to prove that host
> A is really who he says he is?? I assume digital certificates
> can be used for this also. I am looking for a Host authentication
> FAQ of some sorts and not a FAQ on encryption. If anyone has a
> list or any info they can send me back I would appreciate it greatly.
>
> Thanks a bundle,
>
> Ryan
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]