[12197] in cryptography@c2.net mail archive
Implementation guides for DH?
daemon@ATHENA.MIT.EDU (Adam Shostack)
Wed Jan 1 14:15:49 2003
Date: Wed, 1 Jan 2003 13:53:42 -0500
From: Adam Shostack <adam@homeport.org>
To: cryptography@wasabisystems.com
I'm looking for a list of common implementation flaws in DH. Things
like: How to check the key the other side sends, what are acceptable
values for p, etc?
Any pointers?
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com