Loading ...
Sorry, an error occurred while loading the content.

22Shortening a comm path without secrets.

Expand Messages
  • Norman Hardy
    Jun 29, 2007
      The protocol I spoke of is described here: (http://cap-lore.com/
      It assumes two agents on the same platform and a trusted 'introducer'
      which both agents can call.
      The agents want to communicate quickly but they have only a
      roundabout channel.
      No secrets need be kept. In particular a rogue is permitted to see
      all communications.
      All calls on the introducer are prompt.

      (There is a secret buried in the message authentication module.
      If the rogue could impersonate one of the agents over the slow
      initial channel the scheme would fail.)