Scott Gregory Miller <[EMAIL PROTECTED]> writes:

> The protocol should completely defeat the Man in the Middle attack
> as well.

Your protocol doesn't deal with MITM at all.  It assumes that Alice
already knows Bob's public key, and MITM only works in cases where
both Alice and Bob fail to actually receive the other's public key.
If we assume that Alice has been fooled, and has Mallory's public key
instead of Bob's, your protocol does nothing to foil MITM.  There is
no known way to foil MITM without a prior shared secret.

I'm not suggesting that this is a flaw in your protocol, just that
this is a false claim about what the protocol accomplishes.

-S


_______________________________________________
Freenet-dev mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to