[12203] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Implementation guides for DH?

daemon@ATHENA.MIT.EDU (John Kennedy)
Thu Jan 2 14:41:14 2003

Date: Thu, 2 Jan 2003 10:15:54 -0800 (PST)
From: John Kennedy <jckennedy@yahoo.com>
To: Adam Shostack <adam@homeport.org>, cryptography@wasabisystems.com
In-Reply-To: <20030101185342.GA3000@lightship.internal.homeport.org>

ANSI X9.42 is quite thorough in this area.

-John

--- Adam Shostack <adam@homeport.org> wrote:
> I'm looking for a list of common implementation
> flaws in DH.  Things
> like: How to check the key the other side sends,
> what are acceptable
> values for p, etc?
> 
> Any pointers?
> 
> Adam
> 
> 
> -- 
> "It is seldom that liberty of any kind is lost all
> at once."
> 					               -Hume
> 
> 
> 
>
---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to
majordomo@wasabisystems.com


__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post