home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!sgiblab!zaphod.mps.ohio-state.edu!pacific.mps.ohio-state.edu!linac!att!bu.edu!transfer.stratus.com!ellisun.sw.stratus.com!cme
- From: cme@ellisun.sw.stratus.com (Carl Ellison)
- Newsgroups: sci.crypt
- Subject: Re: Public key challenge
- Message-ID: <1e97f0INNmsr@transfer.stratus.com>
- Date: 16 Nov 92 22:30:56 GMT
- References: <1992Nov14.153536.9930@infodev.cam.ac.uk>
- Organization: Stratus Computer, Software Engineering
- Lines: 23
- NNTP-Posting-Host: ellisun.sw.stratus.com
-
- In article <1992Nov14.153536.9930@infodev.cam.ac.uk> rja14@cl.cam.ac.uk (Ross Anderson) writes:
- >
- >Call a public key cryptosystem coercion-resistant if an opponent who
- >monitors the channel between two parties, and some time thereafter
- >obtains the cooperation of one of these parties, cannot recover the
- >session key.
- >
-
- If I wanted to do this with an RSA system, I'd put my session key in
- a record with an expiration datime. My tamper-resistent Digital Signing
- Unit would check the expiration datime and refuse to give me a session
- key which has expired. Under no circumstances would anyone be allowed
- to get the secret part of the RSA key out of the DSU. There would be
- no passive backup of the DSU.
-
- (This calls for a fault tolerant DSU, but then all computers are FT,
- aren't they? :-)
-
- --
- -- <<Disclaimer: All opinions expressed are my own, of course.>>
- -- Carl Ellison cme@sw.stratus.com
- -- Stratus Computer Inc. M3-2-BKW TEL: (508)460-2783
- -- 55 Fairbanks Boulevard ; Marlborough MA 01752-1298 FAX: (508)624-7488
-