-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Matthew Toseland wrote:
> What about in session setup?

To be honest I don't know enough about the key exchange protocol to give
an informed answer. If it's just a question of checking that a hash
matches a public key, we only need second preimage resistance and we
should be safe for the moment - an attacker might be able to generate
two public keys with the same hash, but he can't generate a public key
matching a given hash.

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFE+HsJyua14OQlJ3sRAoZAAKCIlx2urdenA4q4JNaPNPYM/jaTHgCg3IYA
X48Ws5ykOqWgcATVBwTGmOY=
=wUaY
-----END PGP SIGNATURE-----

Reply via email to