Hey, that sounds like a key distribution problem!

It is, quite literally. The scheme can be thought of as a message authentication code (MAC), with a shared key that has to be negotiated ahead of time; and just like with a MAC, anyone who has the secret key is capable of forging the message.


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to