I'll show you mine if you show me, er, mine

Jerrold Leichter jerrold.leichter at smarts.com
Thu Mar 3 14:31:28 PST 2005

| >Briefly, it works like this: point A transmits an encrypted message to point
| >B. Point B can decrypt this, if it knows the password. The decrypted text is
| >then sent back to point A, which can verify the decryption, and confirm that
| >point B really does know point A's password. Point A then sends the password
| >to point B to confirm that it really is point A, and knows its own password.
| Isn't this a Crypto 101 mutual authentication mechanism (or at least a
| somewhat broken reinvention of such)?...

The description has virtually nothing to do with the actual algorithm 
proposed.  Follow the link in the article - http://www.stealth-attacks.info/ - 
for an actual - if informal - description.

							-- Jerry

More information about the cypherpunks-legacy mailing list