Hi,
The pre-shared information need not to be secret ... but there is
need for pre-shared trusted information.
Er, if the pre-shared information is not secret, how can I be sure
that the person presenting it is in fact my intended correspondent
and not a MIM?
That is why I wrote trusted,
On Mar 10, 2010, at 11:59, Olivier Nicole
olivier.nic...@cs.ait.ac.th wrote:
Now Diffie-Hellman may help providing the trust for the fingerprint.
No it won't. Trust goes either via a trusted third party as in PKI or
the pgp chain of trust or via direct verification. In the latter case
Angelin Lalev lalev.ange...@gmail.com wrote:
So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange.
These algorithms can defeat any attempts on eavesdropping, but cannot
defeat man-in-the-middle attacks. To defeat them, some pre-shared
information is needed - key fingerprint.
What happened to Diffie-Hellman? Last I heard, its whole point was
to enable secure communication, protected from both eavesdropping
and MIM attacks, between systems having no prior trust relationship
(e.g. any sort of pre-shared secret). What stops the server and
client from establishing a
On Tue, Mar 9, 2010 at 12:48 AM, Olivier Nicole olivier.nic...@cs.ait.ac.th
wrote:
What happened to Diffie-Hellman? Last I heard, its whole point was
to enable secure communication, protected from both eavesdropping
and MIM attacks, between systems having no prior trust relationship
Olivier Nicole olivier.nic...@cs.ait.ac.th wrote:
What happened to Diffie-Hellman? Last I heard, its whole
point was to enable secure communication, protected from both
eavesdropping and MIM attacks, between systems having no prior
trust relationship (e.g. any sort of pre-shared secret)
On 10/03/10 07:16, per...@pluto.rain.com wrote:
but logic tends to tell me that is I have no prior knowledge about
the person I am about to talk to, anybody (MIM) could pretend to
be that person.
True. Cryptography by it self does not solve the identity problem.
The pre-shared information
Angelin Lalev lalev.ange...@gmail.com writes:
;2~ On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev lalev.ange...@gmail.com
wrote:
Greetings,
I'm doing some research into ssh and its underlying cryptographic
methods and I have questions. I don't know whom else to ask and humbly
ask for
On Sun, Mar 7, 2010 at 3:25 PM, Angelin Lalev lalev.ange...@gmail.com wrote:
Greetings,
I'm doing some research into ssh and its underlying cryptographic
methods and I have questions. I don't know whom else to ask and humbly
ask for forgiveness if I'm way OT.
So, SSH uses algorithms like
Greetings,
I'm doing some research into ssh and its underlying cryptographic
methods and I have questions. I don't know whom else to ask and humbly
ask for forgiveness if I'm way OT.
So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange.
These algorithms can defeat any attempts on
On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev lalev.ange...@gmail.com wrote:
Greetings,
I'm doing some research into ssh and its underlying cryptographic
methods and I have questions. I don't know whom else to ask and humbly
ask for forgiveness if I'm way OT.
So, SSH uses algorithms like
11 matches
Mail list logo