Re: Security through authentication

Grant Sparks (grant@sparks.to)
Fri, 27 Mar 1998 05:31:35 +1000


There is a useful discussion on the Coderpunks list regarding improvements and
weaknesses of this technique.

Grant Sparks
grant@sparks.to

-----Original Message-----
From: Robin Hanson <hanson@econ.Berkeley.EDU>
To: extropians@extropy.com <extropians@extropy.com>
Date: Friday, March 27, 1998 3:26 AM
Subject: Re: Security through authentication

>>Alexander Chislenko suggests we read:
>> More info is available at http://theory.lcs.mit.edu/~rivest/chaffing.txt
>
>Looks good to me. Any good holes found in the argument so far?
>
>
>
>Robin Hanson
>hanson@econ.berkeley.edu http://hanson.berkeley.edu/
>RWJF Health Policy Scholar, Sch. of Public Health 510-643-1884
>140 Warren Hall, UC Berkeley, CA 94720-7360 FAX: 510-643-8614
>