ESP Unix encrypted session protocol software

Eric Hughes eric at remailer.net
Wed Feb 1 08:58:07 PST 1995


   From: Thomas Grant Edwards <tedwards at src.umd.edu>

   I am thinking of the 
   use of a trusted adjudicator who could receive information from both the 
   original participants and check to see if the two keys matched.

How do you authenticate the adjudicator?

You'll have to communicate with the adjudicator and verify one of
their signatures.  You can just as easily exchange signed DH
parameters directly with the other party and verify the signature of
your correspondent.

This is another one of those problems where potential solutions often
just lead to infinite regress.

Eric








More information about the cypherpunks-legacy mailing list