[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
More elveator problem
More on The Elevator Problem:
I'll confess that we're working on a new private key encryption product. Free
and clear of existing claims on intellectual property, I'd like a protocol
that answers the elevator problem: how can Alice and Bob agree on a private
key via a compromised channel? I don't want them to meet under a street lamp
and whisper in each other's ears _before_ trying to establish a secret on a
crowded elevator.
I'm willing to accept that the basic question is undoable without stepping on
DH et al., I just don't want to give up until all parties are convinced it
can't be done.
As I stated in my original post, we're willing to consider less-than-perfect
implimentations if we can quantify mathematically the risk involved. In some
scenarios, Alice and Bob might not expect any Eve's in the crowded elevator
or value the content at such a price that they're willing to live with less
than 100%. As long as we can document the risk, the end user can make the
decision as to whether the risk is worth it.
Something that I neglected to mention before is that Alice and Bob do have a
unique ID within this system, not that they necessarily know each others. If
one assumes that they do, they then share a secret: the knowledge of each
other's unique ID.
Another segment of our attention is being spent daydreaming about the
potential applications of a secondary channel in the cleartext portion of a
crypto "package" or "bundle". The comment about secondary channels that I
believe Tim made regarding the inmates and the warden is something we discuss
in our spare time.
Then again the wheels of justice doth turn and patents ain't forever...
Jerry Whiting
[email protected]