At 9:14 AM -0700 7/27/00, [EMAIL PROTECTED] wrote:
>A colleague asked yesterday "I wonder how much Diffie-Hellman is actually
>used?", as we were sitting around talking about authentication (in
>particular)
>and security (in general) protocols.
>
>So I'm curious, are there any studies on what is actually deployed "out
>there"
>and/or available in products -- qualified as the set of algorithms discussed
>in Chapters 19 and 22 of Applied Cryptography 2nd Ed?
The E protocol uses Diffie Hellman authenticated with DSA. Details (and
source code) are available at http://www.erights.org
-------------------------------------------------------------------------
Bill Frantz | Microsoft Outlook, the | Periwinkle -- Consulting
(408)356-8506 | hacker's path to your | 16345 Englewood Ave.
[EMAIL PROTECTED] | hard disk. | Los Gatos, CA 95032, USA