[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Human ID through insecure channel

>Date: Mon, 16 Oct 1995 13:51:27 -0700
>From: Hal <[email protected]>
>Subject: Human ID through insecure channel
>Here is an example of the Matsumoto/Imai scheme for identifying yourself
>via a shared secret over an insecure channel, a system which is simple
>enough to be done in your head but which can withstand repeated
>observations by an adversary without being broken.


	has this been written up someplace where I might read their

	From your description of it, I have a way to break it in O(N)
samples, where N is the number of characters in the challenge string and
the factor of proportionality is strictly a function of how sure you want
to be that you have a correct break.

 - Carl

 |Carl M. Ellison      [email protected]    http://www.clark.net/pub/cme          |
 |Trusted Information Systems, Inc.   http://www.tis.com/                   |
 |3060 Washington Road          PGP 2.6.2:  61E2DE7FCB9D7984E9C8048BA63221A2|
 |Glenwood MD  21738         Tel:(301)854-6889      FAX:(301)854-5363       |