Check out my first novel, midnight's simulacra!

Lamport's Hash: Difference between revisions

From dankwiki
m (1 revision)
No edit summary
Line 2: Line 2:
<blockquote>"Without public key cryptography, it's difficult to protect against both eavesdropping and server database reading with a single protocol, although is is easy to do one or another...an elegant protocol by [http://research.microsoft.com/users/lamport/ Leslie Lamport] can claim to accomplish this feat."</blockquote>
<blockquote>"Without public key cryptography, it's difficult to protect against both eavesdropping and server database reading with a single protocol, although is is easy to do one or another...an elegant protocol by [http://research.microsoft.com/users/lamport/ Leslie Lamport] can claim to accomplish this feat."</blockquote>
[http://research.microsoft.com/users/lamport/pubs/password.pdf Published in 1981], implemented as S/KEY by [http://citeseer.ist.psu.edu/cache/papers/cs/5967/ftp:zSzzSzftp.mcc.ac.ukzSzpubzSzsecurityzSzPAPERSzSzPASSWORDzSzSKEY.pdf/haller94skey.pdf Haller et al in 1994], and standardized as RFC 1938 in 05-1996.
[http://research.microsoft.com/users/lamport/pubs/password.pdf Published in 1981], implemented as S/KEY by [http://citeseer.ist.psu.edu/cache/papers/cs/5967/ftp:zSzzSzftp.mcc.ac.ukzSzpubzSzsecurityzSzPAPERSzSzPASSWORDzSzSKEY.pdf/haller94skey.pdf Haller et al in 1994], and standardized as RFC 1938 in 05-1996.
[[Category:Leslie Lamport Eponyms]]

Revision as of 07:22, 7 August 2009

From Network Security: Private Communication in a Public World 2nd Edition, p225:

"Without public key cryptography, it's difficult to protect against both eavesdropping and server database reading with a single protocol, although is is easy to do one or another...an elegant protocol by Leslie Lamport can claim to accomplish this feat."

Published in 1981, implemented as S/KEY by Haller et al in 1994, and standardized as RFC 1938 in 05-1996.