home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!munnari.oz.au!network.ucsd.edu!qualcom.qualcomm.com!servo.qualcomm.com!karn
- From: karn@servo.qualcomm.com (Phil Karn)
- Subject: Re: Anti-spoofing protocol?
- Message-ID: <1993Jan5.073526.13043@qualcomm.com>
- Sender: news@qualcomm.com
- Nntp-Posting-Host: servo.qualcomm.com
- Organization: Qualcomm, Inc
- References: <1993Jan5.031805.26623@qualcomm.com> <1993Jan5.054857.10718@netcom.com>
- Date: Tue, 5 Jan 1993 07:35:26 GMT
- Lines: 15
-
-
- Bob Cain suggests the possibility of a spoofer interfering with a
- plaintext voice call. Sure, this is certainly possible in theory,
- although I wouldn't want the job of doing it in real time between a
- pair of speakers who know each other very well.
-
- Nevertheless, this is just one example of the general concept. With
- public key cryptography you eliminate the need for confidentiality of
- the initial key-setting path, even if you still do need to maintain
- authenticity. And that is an enormous practical advantage, because I can
- think of *many* non-confidential channels where I can maintain a
- pretty high level of integrity in the traffic not being modified.
- And I can use several such channels for redundancy.
-
- Phil
-