[2419] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Existing digital phone encryption

daemon@ATHENA.MIT.EDU (Lucky Green)
Tue Mar 31 11:03:47 1998

Date: Mon, 30 Mar 1998 23:59:15 -0800
To: Phil Karn <karn@qualcomm.com>
From: Lucky Green <shamrock@netcom.com>
Cc: cryptography@c2.net
In-Reply-To: <199803310722.XAA14151@servo.qualcomm.com>

At 23:22 98/03/30 -0800, Phil Karn wrote:
>>Thanks.  And how does the mask get propagated to the two phones, e.g.
>>how does the system do 'key management'.
>
>It's a byproduct of the authentication done at call setup.
>
>It uses a keyed hash function called CAVE with a two-level hierarchy
>of secret keys (there's no public key crypto).

Has CAVE been published?

Thanks,


-- Lucky Green <mailto:shamrock@netcom.com> PGP encrypted mail preferred

   "I do believe that where there is a choice only between cowardice and
    violence, I would advise violence." Mahatma Gandhi

home help back first fref pref prev next nref lref last post