Re: How broad is the SPEKE patent.

2005-11-11 Thread Florian Weimer
* James A. Donald:

 I figured that the obvious solution to all this was to deploy zero 
 knowledge technologies, where both parties prove knowledge of the 
 shared secret without revealing the shared secret.

Keep in mind that one party runs the required software on a computed
infected with spyware and other kinds of Trojan horses.  This puts the
effectiveness of zero-knowledge proofs into question.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: FW: How broad is the SPEKE patent.

2005-11-11 Thread Trevor Perrin

Charlie Kaufman wrote:
[...]
I am not aware of anyone who is publicly shipping - either 

 in a commercial product or as open source - an implementation
 of a strong password protocol without having paid protection
 money to either Lucent or Phoenix (or both).

A not totally up-to-date list of SRP implementations  applications is here:

http://srp.stanford.edu/links.html

I suspect most implementors aren't paying anyone.


Trevor

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]