Human ID through insecure channel

Carl Ellison cme at TIS.COM
Sun Oct 29 06:58:26 PST 1995


>Date: Mon, 16 Oct 1995 13:51:27 -0700
>From: Hal <hfinney at shell.portal.com>
>Subject: Human ID through insecure channel
>
>Here is an example of the Matsumoto/Imai scheme for identifying yourself
>via a shared secret over an insecure channel, a system which is simple
>enough to be done in your head but which can withstand repeated
>observations by an adversary without being broken.


Hal,

	has this been written up someplace where I might read their
description?

	From your description of it, I have a way to break it in O(N)
samples, where N is the number of characters in the challenge string and
the factor of proportionality is strictly a function of how sure you want
to be that you have a correct break.


 - Carl


 +--------------------------------------------------------------------------+
 |Carl M. Ellison      cme at tis.com    http://www.clark.net/pub/cme          |
 |Trusted Information Systems, Inc.   http://www.tis.com/                   |
 |3060 Washington Road          PGP 2.6.2:  61E2DE7FCB9D7984E9C8048BA63221A2|
 |Glenwood MD  21738         Tel:(301)854-6889      FAX:(301)854-5363       |
 +--------------------------------------------------------------------------+






More information about the cypherpunks-legacy mailing list