CryptKit 0.9: cryptsock

Bryan bryan at eevolved.com
Mon Dec 3 09:40:52 EST 2001


On Sunday 02 December 2001 09:26 pm, Paul Crowley wrote:

> AMP carries a "proof of security", but I can't follow it, and I spoke
> to an expert in this field who says he's not convinced by it either.
> Furthermore, AMP has a similar problem to SRP, that a sufficiently
> devious fake server can check two passwords with every query.  That
> the proof doesn't rule this out indicates some problems with it.
>
> It's straightforward to propose a variant on AMP that doesn't have
> this problem, and that variant may be secure, but I'd like to have a
> better way to construct the proof of security for that.
>
> As far as I can tell from the ResearchIndex URL, that paper hasn't
> been published yet as such.  I think the protocol has great merit and
> I hope it does get published, though I don't see the advantages of the
> "amplification scheme" over simply encrypting the password file with a
> symmetric cipher.
>
> If I was going to implement something now, I'd certainly use SRP.

Thanks for the input. What are your thoughts about EC-PAK? 
http://citeseer.nj.nec.com/mackenzie01more.html

-- 
<==================================>
Bryan Mongeau
eEvolved Real-Time Technologies Inc.
Website: http://www.eevolved.com
Public key: http://pgp.mit.edu
<==================================>

"Eventually software systems will be able to create bold new designs without 
human help. Will most people call such systems intelligent? It doesn't really 
matter." -- K. Eric Drexler




More information about the Python-list mailing list