opie or s/key with gpg? (fwd)

Atom 'Smasher' atom-gpg at suspicious.org
Wed Oct 8 18:35:32 CEST 2003


> If you come up with a scheme that prevents an attacker from deriving
> OTP x+n from OTP x using the hash-x-times methodology in OPIE, I, and
> doubtless many others across the Internet, would be quite interested
> to see how.
=======================

hehe... inquiring minds would want to know....

bear in mind that opie & s/key are (together) just one particular protocol
for generating one-time-passwords. there are other methods, but most are
impractical, for a variety of reasons. i think that ~if~ it is possible to
do something like this, it would probably have to be a different protocol.


        ...atom

_______________________________________________
PGP key - http://smasher.suspicious.org/pgp.txt
3EBE 2810 30AE 601D 54B2 4A90 9C28 0BBF 3D7D 41E3
-------------------------------------------------

	"The proposition that intelligence has any long-term
	 survival value remains to be demonstrated."
		-- Arthur C. Clarke




More information about the Gnupg-users mailing list