[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Re: question about Nonce



	you still did not tell if the nonce in phase one and the one in phase two is
the same. And I think the cookie is not the nonce. It's cookie's reachability, not
nonce's, that is tested.
	I am a newbie in security area. Maybe I miss your point. Would you give more 
detail?



you writes:
>The nonce provides a quick, non-cryptographic check to prevent not
>only replay but also DoS attacks.  The responder should not have to
>perform any high-CPU operations (e.g. modexp) until the nonce (cookie)
>reachability test has succeeded.
>
>-derek
>
>dxh <sleepy-cat@263.net> writes:
>
>> 	I am not sure if the nonce in Phase One is the same as 
>> the one in Phase two. And I still can not see why there is 
>> need using nonce to prevent from replay attacking in Phase 
>> One. I think the Kes of DH exch can do this.
>> 
>> 
>> 
>> Dong Xiaohu
>> 
>
>-- 
>       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
>       Member, MIT Student Information Processing Board  (SIPB)
>       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
>       warlord@MIT.EDU                        PGP key available

                    ÖÂ
Àñ£¡

            dxh
            sleepy-cat@263.net



Follow-Ups: