22Shortening a comm path without secrets.
- Jun 29, 2007The protocol I spoke of is described here: (http://cap-lore.com/
It assumes two agents on the same platform and a trusted 'introducer'
which both agents can call.
The agents want to communicate quickly but they have only a
No secrets need be kept. In particular a rogue is permitted to see
All calls on the introducer are prompt.
(There is a secret buried in the message authentication module.
If the rogue could impersonate one of the agents over the slow
initial channel the scheme would fail.)