So I'm reading up on unconditionally secure authentication in Simmon's
Contemporary Cryptology, and he points out that with RSA, given d,
you could calculate e (remember, this is authentication not
encryption) if you could factor n, which relates the two. However,
the implication is in the less
I came across the same problem a couple of years ago (and indeed
iterated through private/public key solutions with a colleague). The
problem is that you can still give your private key to somebody else.
There's no real deterrent unless that private key is used for many
other purposes,
On Sat, Apr 01, 2006 at 12:35:12PM +0100, Ben Laurie wrote:
However, anyone I show this proof to can then masquerade as a silver
member, using my signed nonce. So, it occurred to me that an easy
way to prevent this is to create a private/public key pair and
instead of the nonce use the hash of
On 4/2/06, Travis H. [EMAIL PROTECTED] wrote:
So I'm reading up on unconditionally secure authentication in Simmon's
Contemporary Cryptology, and he points out that with RSA, given d,
you could calculate e (remember, this is authentication not
encryption) if you could factor n, which relates
At 1:41 -0600 2006/04/02, Travis H. wrote:
So I'm reading up on unconditionally secure authentication in Simmon's
Contemporary Cryptology, and he points out that with RSA, given d,
you could calculate e (remember, this is authentication not
encryption) if you could factor n, which relates the