Re: Diffie-Hellman and MITM

2002-07-05 Thread Morlock Elloi
> Consider setting up a secure video call with somebody, > and each of you reading the hash of your DH parameter to the other. > It's really hard for a MITM to fake that - but if you don't know > what the other person looks or sounds like, do you know it's really them, > or did you just have an un

Re: Diffie-Hellman and MITM

2002-07-01 Thread gfgs pedo
hi, Thanx Mark, I was also wondering on the line of hash functions too,me 2 dont see how it works securely. Nor does the interlock protocol look secure to me. Regards Data. --- Marcel Popescu <[EMAIL PROTECTED]> wrote: > From: "gfgs pedo" <[EMAIL PROTECTED]> > > > One solution suggested agai

Re: Diffie-Hellman and MITM

2002-06-30 Thread Marcel Popescu
From: "gfgs pedo" <[EMAIL PROTECTED]> > One solution suggested against the man in the middle > attack is using the interlock protocol This is the one I vaguely recalled, thank you. > All mallory would have to do is send the half of the > (n th) packet when he receives the half of (n+1)th > pack

Re: Diffie-Hellman and MITM

2002-06-29 Thread gfgs pedo
hi, If there is no previous shared secret,then ur communication on an insecure network is susecptable to the man in the middle attack. One solution suggested against the man in the middle attack is using the interlock protocol InterLock Protocol Is used to foil a man in the middle attack,

Re: Diffie-Hellman and MITM

2002-06-27 Thread Mike Rosing
On Thu, 27 Jun 2002, Marcel Popescu wrote: > Is there a defense against MITM for Diffie-Hellman? Is there another > protocol with equivalent properties, with such a defense? (Secure > communications between two parties, with no shared secret and no out-of-band > abilities, on an insecure network.

Diffie-Hellman and MITM

2002-06-27 Thread Marcel Popescu
Is there a defense against MITM for Diffie-Hellman? Is there another protocol with equivalent properties, with such a defense? (Secure communications between two parties, with no shared secret and no out-of-band abilities, on an insecure network.) Thanks, Mark