Foiling MITM attacks?
Benjamin Weste Pearre
bwpearre@alumni.princeton.edu
Tue Mar 25 04:06:02 2003
--R+My9LyyhiUvIEro
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
I just got my feet wet in crypto, so it's not surprising that it'll
take me a while to understand this, but I'm too impatient to read
before asking y'all about this paper:
http://www.wisdom.weizmann.ac.il/~boaz/Papers/nmc.html
It develops a technique for foiling man-in-the-middle attacks. Can it
be used practically? It sure would be nice to be able to get rid of
the web of trust...
--=20
Ben Pearre http://hebb.mit.edu/~ben
--R+My9LyyhiUvIEro
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+f8e2+CWfKs/abNoRAou5AKC7YaO7oexHElB+GRDBAEG/76/XvQCfWNON
rBamPQtDUHbCTJDSdrWnbgE=
=VqXU
-----END PGP SIGNATURE-----
--R+My9LyyhiUvIEro--