On Mon, Sep 26, 2011 at 12:37:40PM +0200, Folkert van Heusden wrote:
> >>>> we'll only do one hash
> >>>> at the beginning of the connection
> >>>
> >>> Hopefully you'll do at least 2, and (if authenticating the other way) 4!
> >>> But yes.
> >>
> >> Why 2/4?
> >
> > 2 because you have to carry out the hash on both ends in order to
> > compare them.
> 
> Maybe I'm missing something but isn't obvious that you need to hash at
> both sides to be able to verify at all?

Yes, Alex was just being pedantic :-)

-- 
The volume of a pizza of thickness a and radius z can be described by
the following formula:

pi zz a

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Nbd-general mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/nbd-general

Reply via email to