A shared secret is all secure magnesium.
I file with random numbers shared by host A and  B,send only ones
or make the first Public key secret.

A:    Random num. ||        Date         ||      Public key
1) 624672577272    ||     1999-06-23 ||    RSA key1- Public A (a secret)
2) 456466461725           1999-06-24       RSA Key2
3) 747484744927           1999-06-25

B:
1) 624672577272
2) 456466461725
3) 747484744927



----------
> From: ryanm <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
> Subject: Authentication Schemes
> Date: Tuesday, June 22, 1999 9:39 PM
> 
> Hello Security experts,
> 
> I am curious what different authentication schemes exist for
> proving who someone( Workstation ) or something is. I have used 
> RSA auth in the past. What else can be used to prove that host 
> A is really who he says he is?? I assume digital certificates
> can be used for this also. I am looking for a Host authentication
> FAQ of some sorts and not a FAQ on encryption. If anyone has a 
> list or any info they can send me back I would appreciate it greatly.
> 
> Thanks a bundle,
> 
> Ryan
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to