Re: Diffie-Hellman and MITM

2002-07-05 Thread Morlock Elloi
> Consider setting up a secure video call with somebody, > and each of you reading the hash of your DH parameter to the other. > It's really hard for a MITM to fake that - but if you don't know > what the other person looks or sounds like, do you know it's really them, > or did you just have an un

Re: Diffie-Hellman and MITM

2002-07-04 Thread Bill Stewart
At 12:26 PM 06/28/2002 +0300, Marcel Popescu wrote: >From: "Mike Rosing" <[EMAIL PROTECTED]> > > > Is there a defense against MITM for Diffie-Hellman? Is there another > > > protocol with equivalent properties, with such a defense? (Secure > > > communications between two parties, with no shared s

Re: Diffie-Hellman and MITM

2002-07-01 Thread gfgs pedo
hi, Thanx Mark, I was also wondering on the line of hash functions too,me 2 dont see how it works securely. Nor does the interlock protocol look secure to me. Regards Data. --- Marcel Popescu <[EMAIL PROTECTED]> wrote: > From: "gfgs pedo" <[EMAIL PROTECTED]> > > > One solution suggested agai

Re: Diffie-Hellman and MITM

2002-06-30 Thread Marcel Popescu
From: "gfgs pedo" <[EMAIL PROTECTED]> > One solution suggested against the man in the middle > attack is using the interlock protocol This is the one I vaguely recalled, thank you. > All mallory would have to do is send the half of the > (n th) packet when he receives the half of (n+1)th > pack

Re: Diffie-Hellman and MITM

2002-06-29 Thread gfgs pedo
hi, If there is no previous shared secret,then ur communication on an insecure network is susecptable to the man in the middle attack. One solution suggested against the man in the middle attack is using the interlock protocol InterLock Protocol Is used to foil a man in the middle attack,

Re: Diffie-Hellman and MITM

2002-06-28 Thread Marcel Popescu
From: "Mike Rosing" <[EMAIL PROTECTED]> > > Is there a defense against MITM for Diffie-Hellman? Is there another > > protocol with equivalent properties, with such a defense? (Secure > > communications between two parties, with no shared secret and no out-of-band > > abilities, on an insecure net