Re: How broad is the SPEKE patent.
* James A. Donald: I figured that the obvious solution to all this was to deploy zero knowledge technologies, where both parties prove knowledge of the shared secret without revealing the shared secret. Keep in mind that one party runs the required software on a computed infected with spyware and other kinds of Trojan horses. This puts the effectiveness of zero-knowledge proofs into question. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: FW: How broad is the SPEKE patent.
Charlie Kaufman wrote: [...] I am not aware of anyone who is publicly shipping - either in a commercial product or as open source - an implementation of a strong password protocol without having paid protection money to either Lucent or Phoenix (or both). A not totally up-to-date list of SRP implementations applications is here: http://srp.stanford.edu/links.html I suspect most implementors aren't paying anyone. Trevor - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]