On May 19, 2006, at 12:51 PM, Charles Yeomans wrote:

How about it cryptographers?  Is this reasonably secure, or just
an exercise in security by obscurity?

The solution is not hard. Each time you generate a stream for encryption, it needs to be different. This is true for any stream cipher. What you do is change the key each time, usually by adding some random data. Then you need to some way to remember the data...

The method I mentioned is only part of my system. I use a Challenge- Response technique during the login which uses a random hash to create this seed on both ends. Both the client and the server will apply this challenge seed value and MD5() the results before transmitting.

It is not SSL, but it works pretty well for systems which SSL is expensive or not an option.

_______________________________________________
Unsubscribe or switch delivery mode:
<http://www.realsoftware.com/support/listmanager/>

Search the archives of this list here:
<http://support.realsoftware.com/listarchives/lists.html>

Reply via email to