--
At 09:59 AM 8/31/2000 -0700, Michael Thomas wrote:
 > It looks like your argument is not with the SIP WG but with the CAT
 > WG. I'm sure a lot of folks there would be willing to entertain (or
 > not) this argument. In particular, the assertion that that Kerberos
 > is inherently subject to dictionary attacks looks more like an
 > indictment against symmetric key cryptography in general, rather
 > than Kerberos in particular.

There is nothing special about symmetric key cryptography that makes it 
particularly subject to dictionary attacks.  In all public key solutions, 
the public keys are used to set up a symmetric key that is not subject to 
dictionary attacks.

It is probably possible to set up a system with properties similar to those 
that I outlined using nothing but symmetric key cryptography, though it 
would be more complex, hence harder to understand and harder to get right.

Existing symmetric key solutions (Kerberos) are vulnerable to dictionary attack

Existing public key solutions are hard to use and unpopular.  This is a 
property of the particular implementations, and the particular tasks for 
which they are used, not a property of the underrlying technology

Most proposed alternatives to Kerberos work the same way as kerberos does 
for the user, and are arguably simpler in their internal implementation, 
but employ public key operations internally.

     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      sz1++Q1L/bMWO8371Rxt7o5B/H0Xsn6u/sX227rI
      4PFseTKUfAEU9X1rCbMXXjjvrDk7PeeoknjQHHjJr

Reply via email to