[Using multiple channels on the assumption that the MITM can't always get all
of them.]
This is starting to sound like some very old work - to which I don't have a
reference - on what was called the wiretap channel. Basic idea: Alice and
Bob wish to talk; Carol can listen in to everything, but
| This is the second significant problem I have seen in applications that use
| ASN.1 data formats. (The first was in a widely deployed implementation of
| SNMP.) Given that good, security conscience programmers have difficultly
| getting ASN.1 parsing right, we should favor protocols that use
On Sat, 4 Oct 2003, Benja Fallenstein wrote:
Does it work?
Assume A() is Alice's series, B() is Bob's, MA() is the one Mitch uses
with Alice, MB() the one Mitch uses with Bob.
- Mitch sends first half of cyphertext of MA(1000) (to Alice)
- Alice sends first half of cyphertext of her move +
On Sun, Oct 05, 2003 at 03:04:00PM +0100, Ben Laurie wrote:
Thor Lancelot Simon wrote:
On Sat, Oct 04, 2003 at 02:09:10PM +0100, Ben Laurie wrote:
Thor Lancelot Simon wrote:
these operations. For example, there is no simple way to do the most
common certificate validation operation: