(Off Topic) Re: FCC_ups

David Wagner daw at cs.berkeley.edu
Tue Aug 13 06:30:32 PDT 1996


In article <Pine.BSF.3.91.960812153240.26183B-100000 at mcfeely.bsfs.org>,
Rabid Wombat  <wombat at mcfeely.bsfs.org> wrote:
> ob crypto (for anyone who read this far): When packet switched voice 
> systems become a reality, how can secure calls be placed to any number? 
> Key exchange during call set-up? How long will this make the call set-up?

This is easy.  Just use end-to-end encryption.  No sweat.  (So what if
call setup takes a half a second to do a public key encryption?  The phone
rings for a couple of seconds before the other guy picks it up anyhow.)

Well, there's that nasty key distribution and management problem (e.g.
who certifies the millions of public keys corresponding to everyone's
phone number?), but that's not specific to voice traffic, and this is
a well-known annoying problem.


The *real* challenge: how do you support sender- and recipient- anonymous
phone calls with strong security?  Have fun.






More information about the cypherpunks-legacy mailing list