[14471] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: anonymous DH & MITM

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Fri Oct 3 15:03:03 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@research.att.com>
To: Benja Fallenstein <b.fallenstein@gmx.de>
Cc: bear <bear@sonic.net>, "Zooko O'Whielacronx" <zooko@zooko.com>,
	Ian Grigg <iang@systemics.com>, M Taylor <mctylr@privacy.nb.ca>,
	Cryptography list <cryptography@metzdowd.com>
In-Reply-To: Your message of "Fri, 03 Oct 2003 20:23:24 +0300."
             <3F7DB08C.30105@gmx.de> 
Date: Fri, 03 Oct 2003 14:52:18 -0400

In message <3F7DB08C.30105@gmx.de>, Benja Fallenstein writes:
>
>Hi,
>
>bear wrote:
>>>>>starting with Rivest & Shamir's Interlock Protocol from 1984.
>>>>
>>>>Hmmm.  I'll go read, and thanks for the pointer.
>> 
>> Perhaps I spoke too soon?  It's not in Eurocrypt or Crypto 84 or 85,
>> which are on my shelf.  Where was it published?
>
>Communications of the ACM: Rivest and
>Shamir, "How to expose an eavesdropper", CACM vol 24 issue 4, 1984. If 
>you have an ACM Digital Library account, it's at
>
>http://portal.acm.org/ft_gateway.cfm?id=358053&type=pdf&coll=ACM&dl=ACM&CFID=1
>2683735&CFTOKEN=40809148
>
>I've started writing a short summary earlier today, after reading, but 
>then I got distracted and didn't have time... sorry :) Hope this helps 
>anyway.
>
>The basic idea is that Alice sends *half* of her ciphertext, then Bob 
>*half* of his, then Alice sends the other half and Bob sends the other 
>half (each step is started only after the previous one was completed). 
>The point is that having only half of the first ciphertext, Mitch can't 
>decrypt it, and thus not pass on the correct thing to Bob in the first 
>step and to Alice in the second, so both can actually be sure to have 
>the public key of the person that made the other move.
>

You have to be careful how you apply it; sometimes, there are attacks.  
See Steven M. Bellovin and Michael Merritt, "An Attack on the Interlock
Protocol When Used for Authentication," in IEEE Transactions on
Information Theory 40:1, pp. 273-275, January 1994,
http://www.research.att.com/~smb/papers/interlock.ps for an example of 
how it's a bad protocol to use to send passwords.  

		--Steve Bellovin, http://www.research.att.com/~smb


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post