opie or s/key with gpg? (fwd)
Atom 'Smasher'
atom-gpg at suspicious.org
Wed Oct 8 18:35:32 CEST 2003
> If you come up with a scheme that prevents an attacker from deriving
> OTP x+n from OTP x using the hash-x-times methodology in OPIE, I, and
> doubtless many others across the Internet, would be quite interested
> to see how.
=======================
hehe... inquiring minds would want to know....
bear in mind that opie & s/key are (together) just one particular protocol
for generating one-time-passwords. there are other methods, but most are
impractical, for a variety of reasons. i think that ~if~ it is possible to
do something like this, it would probably have to be a different protocol.
...atom
_______________________________________________
PGP key - http://smasher.suspicious.org/pgp.txt
3EBE 2810 30AE 601D 54B2 4A90 9C28 0BBF 3D7D 41E3
-------------------------------------------------
"The proposition that intelligence has any long-term
survival value remains to be demonstrated."
-- Arthur C. Clarke
More information about the Gnupg-users
mailing list