I'll show you mine if you show me, er, mine
jerrold.leichter at smarts.com
Thu Mar 3 14:31:28 PST 2005
| >Briefly, it works like this: point A transmits an encrypted message to point
| >B. Point B can decrypt this, if it knows the password. The decrypted text is
| >then sent back to point A, which can verify the decryption, and confirm that
| >point B really does know point A's password. Point A then sends the password
| >to point B to confirm that it really is point A, and knows its own password.
| Isn't this a Crypto 101 mutual authentication mechanism (or at least a
| somewhat broken reinvention of such)?...
The description has virtually nothing to do with the actual algorithm
proposed. Follow the link in the article - http://www.stealth-attacks.info/ -
for an actual - if informal - description.
More information about the cypherpunks-legacy