Re: Unpatented PAKE!

2008-06-02 Thread Scott G. Kelly
Ben Laurie wrote: >Scott G. Kelly wrote: >> Here's another approach to password authenticated key exchange with >> similar security claims. The underlying mechanism is under >> consideration for inclusion in by the 802.11s group in IEEE: >> >> http://www.

Re: Unpatented PAKE!

2008-05-31 Thread Scott G. Kelly
[Moderator's note: Please do not top post. --Perry] Here's another approach to password authenticated key exchange with similar security claims. The underlying mechanism is under consideration for inclusion in by the 802.11s group in IEEE: http://www.ietf.org/internet-drafts/draft-harkins-emu-e

Re: man in the middle, SSL

2007-02-03 Thread Scott G Kelly
James Muir wrote: > I was reading a hacking blog today and came across this: > > http://www.darknet.org.uk/2007/02/odysseus-win32-proxy-telemachus-http-transaction-analysis/ > > >> Odysseus is a proxy server, which acts as a man-in-the-middle during >> an HTTP session. A typical HTTP proxy will

Re: SSL

2003-07-10 Thread Scott G. Kelly
Hi Jill, To add to Perry's note, I think Eric's book is very good, and I've also been reading "Network Security with OpenSSL", an O'Reilly book by Viega, Messier, and Chandra -it's been exceedingly helpful in understanding and working with openssl. Scott [EMAIL PROTECTED] wrote: | Hi, | | I've be