Yet Another Diffie-Hellman Alternative

Discussion in 'NZ Computing' started by Lawrence D'Oliveiro, Mar 5, 2010.

  1. I don’t understand the point of this
    <http://www.h-online.com/security/news/item/CeBIT-2010-Generating-keys-from-radio-echoes-946643.html>.
    If both parties have prearranged a shared secret or previously exchanged
    public keys, then there are any number of established ways they can use that
    to set up a secure connection. And if they haven’t done such a thing, then
    how can they be sure who they’re talking to, anyway? (Man-in-the-middle
    attack.)
    Lawrence D'Oliveiro, Mar 5, 2010
    #1
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Merlin Zener

    yet another yEnc question

    Merlin Zener, Jul 18, 2003, in forum: Firefox
    Replies:
    1
    Views:
    1,129
    Roger Vicker, CCP
    Jul 19, 2003
  2. Darren Green
    Replies:
    1
    Views:
    2,455
    Darren Green
    Oct 20, 2004
  3. profile0104

    Diffie Hellman

    profile0104, Jul 28, 2005, in forum: Cisco
    Replies:
    3
    Views:
    1,961
  4. John Capleton
    Replies:
    3
    Views:
    1,952
  5. Replies:
    5
    Views:
    6,745
    Darren Green
    Mar 20, 2007
Loading...

Share This Page