[12197] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Implementation guides for DH?

daemon@ATHENA.MIT.EDU (Adam Shostack)
Wed Jan 1 14:15:49 2003

Date: Wed, 1 Jan 2003 13:53:42 -0500
From: Adam Shostack <adam@homeport.org>
To: cryptography@wasabisystems.com

I'm looking for a list of common implementation flaws in DH.  Things
like: How to check the key the other side sends, what are acceptable
values for p, etc?

Any pointers?

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post