--
James A. Donald writes:
 > > In all public key solutions,the public keys are used to set up a
 > > symmetric key that is not subject to dictionary attacks.

At 09:32 AM 9/1/2000 -0700, Michael Thomas wrote:
 > False. A public key solution that chose bad  symmetric keys would be
 > subject to dictionary attacks and much more.

All existing public key protocols, for example https, generate ephemeral 
computer generated symmetric keys that are invulnerable to dictionary attack.

The SPEKE protocol, the various EKE protocols and the PGP phone protocol 
also generate ephemeral computer generated private keys that are 
invulnerable to dictionary attack, as well as generating ephemeral computer 
generated symmetric keys that are invulnerable to dictionary attack.

James A. Donald:
  > > Existing symmetric key solutions (Kerberos) are vulnerable to
  > > dictionary attack

Michael Thomas
 > This is a ludicrous strawman.

This is a simple fact, as has been proven by experiment.  Once again, I 
point you to http://theory.stanford.edu/~tjw/krbpass.html

 >  People choose dictionary attackable symmetric keys, not Kerberos.

People will always choose such passphrases.  Kerberos allows the 
attack.  Modern systems do not.

Modern systems, such as SPEKE, are secure even when people choose such 
passwords, as they almost always do.

     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      UP7kKPgsDeT0+7xcZCaBx+MpR1w99cX8FWDKmH3Z
      4/komD2VbLq1nRMs2vSomlGd1IBRC+OkbOsQGFW6x

Reply via email to