Secure comm program, Sockets + LINK

jim at tadpole.com jim at tadpole.com
Wed Jul 14 10:52:57 PDT 1993



> You can't even solve the problem with DH key exchange -- you are
> subject to "man in the middle" attacks. You must share SOME
> information via a secure channel in order to have both authentication
> and privacy on a channel. However, the information exchanged could be
> small and fairly one-time -- like the public key of a trusted entity
> that signs other public keys.

How do STU-III phones work then?  Do they have some key in rom?

Jim






More information about the cypherpunks-legacy mailing list