[12203] in cryptography@c2.net mail archive
Re: Implementation guides for DH?
daemon@ATHENA.MIT.EDU (John Kennedy)
Thu Jan 2 14:41:14 2003
Date: Thu, 2 Jan 2003 10:15:54 -0800 (PST)
From: John Kennedy <jckennedy@yahoo.com>
To: Adam Shostack <adam@homeport.org>, cryptography@wasabisystems.com
In-Reply-To: <20030101185342.GA3000@lightship.internal.homeport.org>
ANSI X9.42 is quite thorough in this area.
-John
--- Adam Shostack <adam@homeport.org> wrote:
> I'm looking for a list of common implementation
> flaws in DH. Things
> like: How to check the key the other side sends,
> what are acceptable
> values for p, etc?
>
> Any pointers?
>
> Adam
>
>
> --
> "It is seldom that liberty of any kind is lost all
> at once."
> -Hume
>
>
>
>
---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to
majordomo@wasabisystems.com
__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com