Secure comm program, Sockets + LINK
jim at tadpole.com
jim at tadpole.com
Wed Jul 14 10:52:57 PDT 1993
> You can't even solve the problem with DH key exchange -- you are
> subject to "man in the middle" attacks. You must share SOME
> information via a secure channel in order to have both authentication
> and privacy on a channel. However, the information exchanged could be
> small and fairly one-time -- like the public key of a trusted entity
> that signs other public keys.
How do STU-III phones work then? Do they have some key in rom?
Jim
More information about the cypherpunks-legacy
mailing list