[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Perfect forward SECURITY (bypass channel?)




Ashar,

> ... I don't have any
> difficulty imagining the very real possibility that wily hackers
> will use the strategy of bypassing the system's security apparatus
> in order to break in. In attempting to do this, they will almost
> certainly try (sometimes with success) to subvert a channel that is
> invitingly named a "bypass" channel, something that you have just
> re-introduced using the signature approach.

Could you explain this attack? Do you claim that both
Photuris and Jim's proposal (and our PK protocol in MKMP)
have such a weakness?

Thanks, Amir




References: