home *** CD-ROM | disk | FTP | other *** search
/ NetNews Usenet Archive 1993 #1 / NN_1993_1.iso / spool / sci / crypt / 6391 < prev    next >
Encoding:
Text File  |  1993-01-05  |  1.2 KB  |  28 lines

  1. Newsgroups: sci.crypt
  2. Path: sparky!uunet!munnari.oz.au!network.ucsd.edu!qualcom.qualcomm.com!servo.qualcomm.com!karn
  3. From: karn@servo.qualcomm.com (Phil Karn)
  4. Subject: Re: Anti-spoofing protocol?
  5. Message-ID: <1993Jan5.073526.13043@qualcomm.com>
  6. Sender: news@qualcomm.com
  7. Nntp-Posting-Host: servo.qualcomm.com
  8. Organization: Qualcomm, Inc
  9. References: <1993Jan5.031805.26623@qualcomm.com> <1993Jan5.054857.10718@netcom.com>
  10. Date: Tue, 5 Jan 1993 07:35:26 GMT
  11. Lines: 15
  12.  
  13.  
  14. Bob Cain suggests the possibility of a spoofer interfering with a
  15. plaintext voice call. Sure, this is certainly possible in theory,
  16. although I wouldn't want the job of doing it in real time between a
  17. pair of speakers who know each other very well.
  18.  
  19. Nevertheless, this is just one example of the general concept. With
  20. public key cryptography you eliminate the need for confidentiality of
  21. the initial key-setting path, even if you still do need to maintain
  22. authenticity. And that is an enormous practical advantage, because I can
  23. think of *many* non-confidential channels where I can maintain a
  24. pretty high level of integrity in the traffic not being modified.
  25. And I can use several such channels for redundancy.
  26.  
  27. Phil
  28.