home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!spool.mu.edu!enterpoop.mit.edu!bloom-picayune.mit.edu!news.mit.edu!warlord
- From: warlord@MIT.EDU (Derek Atkins)
- Subject: Re: Public Key Ciphers
- In-Reply-To: george@minster.york.ac.uk's message of 20 Jan 93 14:25:00 GMT
- Message-ID: <WARLORD.93Jan20210224@m1-115-7.mit.edu>
- Sender: news@athena.mit.edu (News system)
- Nntp-Posting-Host: m1-115-7.mit.edu
- Organization: Massachusetts Institute of Technology
- References: <727539899.8167@minster.york.ac.uk>
- Date: Thu, 21 Jan 1993 02:02:32 GMT
- Lines: 23
-
- If you are trying to secure the network, and if you can trust the
- machines that you are trying to secure, then I suggest you look into
- Kerberos (comp.protocols.kerberos, or kerberos@mit.edu). It is based
- on DES, and uses shared secrets between entities to prove
- authenticity.
-
- It doesn't sound like you need real-time key distribution, which is
- something that Public Key algorithms have over secret-key algorithms,
- but if you have physical access to both machines, then you can place a
- shared secret on both machines and now that link is secure...
-
- I hope this helps. If you have any more questions, feel free to ask.
-
- -derek
-
- PGP 2 key available upon request, or via AFS:
- /afs/athena.mit.edu/user/w/a/warlord/pgp-pubkey.asc
-
- --
- Derek Atkins, MIT '93, Electrical Engineering and Computer Science
- Chairman, MIT Student Information Processing Board (SIPB)
- MIT Media Laboratory, Speech Research Group
- warlord@MIT.EDU PP-ASEL N1NWH
-