Foiling MITM attacks?

Benjamin Weste Pearre bwpearre@alumni.princeton.edu
Tue Mar 25 04:06:02 2003


--R+My9LyyhiUvIEro
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

I just got my feet wet in crypto, so it's not surprising that it'll
take me a while to understand this, but I'm too impatient to read
before asking y'all about this paper:

http://www.wisdom.weizmann.ac.il/~boaz/Papers/nmc.html

It develops a technique for foiling man-in-the-middle attacks.  Can it
be used practically?  It sure would be nice to be able to get rid of
the web of trust...

--=20
Ben Pearre                               http://hebb.mit.edu/~ben

--R+My9LyyhiUvIEro
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+f8e2+CWfKs/abNoRAou5AKC7YaO7oexHElB+GRDBAEG/76/XvQCfWNON
rBamPQtDUHbCTJDSdrWnbgE=
=VqXU
-----END PGP SIGNATURE-----

--R+My9LyyhiUvIEro--