Question: Key Distr. in realtimeo applications?

cort cort at ecn.purdue.edu
Thu Jul 7 19:55:45 PDT 1994


> If so, how is this key distributed to both participants?

Find Diffie-Hellman in your Schneier.

D-H is a fundamental (in the sense of foundations) protocol which
transmits information "invisibly" (mathematically speaking).

For related invisibility, read about the Dining Cryptographers.

Cort.





More information about the cypherpunks-legacy mailing list