TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How to Expose an Eavesdropper (1984)

76 点作者 joaobatalha将近 9 年前

3 条评论

thenewwazoo将近 9 年前
Neat concept! This protocol appears to be a response to weaknesses in DH key exchange, which I understand to already be thoroughly broken. Can someone with more expertise perhaps explain if my understanding is correct, and whether this interlock technique is applicable or has been adopted anywhere?
评论 #12393271 未加载
g_p将近 9 年前
For anyone interested in this, it&#x27;s worth also taking a look at a related follow-up paper discussing a weakness in the use of the interlock technique for authentication [0]. I recognised the title here and recalled reading this paper some time ago.<p>[0] Bellovin, Steven M., and Michael Merritt. &quot;An attack on the interlock protocol when used for authentication.&quot; IEEE Transactions on Information Theory 40.1 (1994): 273-275.<p>PDF at <a href="http:&#x2F;&#x2F;citeseerx.ist.psu.edu&#x2F;viewdoc&#x2F;download?doi=10.1.1.112.1529&amp;rep=rep1&amp;type=pdf" rel="nofollow">http:&#x2F;&#x2F;citeseerx.ist.psu.edu&#x2F;viewdoc&#x2F;download?doi=10.1.1.112...</a><p>From the abstract,<p>&gt; [...] We demonstrate that an active attacker can, at the cost of a timeout alarm, bypass the password exchange, and capture the passwords used. Furthermore, if the attack is from a terminal or workstation attempting to contact a computer, the attacker will have access before any alarm can be sounded.
whatgoodisaroad将近 9 年前
Link to a regular PDF: <a href="https:&#x2F;&#x2F;people.csail.mit.edu&#x2F;rivest&#x2F;RivestShamir-HowToExposeAnEavesdropper.pdf" rel="nofollow">https:&#x2F;&#x2F;people.csail.mit.edu&#x2F;rivest&#x2F;RivestShamir-HowToExpose...</a>