At 9:14 AM -0700 7/27/00, [EMAIL PROTECTED] wrote:
>A colleague asked yesterday "I wonder how much Diffie-Hellman is actually
>used?", as we were sitting around talking about authentication (in
>particular)
>and security (in general) protocols.
>
>So I'm curious, are there any studies on what is actually deployed "out
>there"
>and/or available in products -- qualified as the set of algorithms discussed
>in Chapters 19 and 22 of Applied Cryptography 2nd Ed?

The E protocol uses Diffie Hellman authenticated with DSA.  Details (and
source code) are available at http://www.erights.org


-------------------------------------------------------------------------
Bill Frantz       | Microsoft Outlook, the     | Periwinkle -- Consulting
(408)356-8506     | hacker's path to your      | 16345 Englewood Ave.
[EMAIL PROTECTED] | hard disk.                 | Los Gatos, CA 95032, USA



Reply via email to