Security Basics mailing list archives
Re: Encryption question
From: Joerg Over Dexia <over () dexia de>
Date: Tue, 02 Mar 2004 19:34:20 +0100
Am 14:49 02.03.2004 +0100 teilte F.O. Bossert mir folgendes mit: ->But that is his point! Sending an Fake message with an fake hash, with ->real public key and fake private key, ->does give the receiver the false impression that the message is from Alice! No. again: No. You sign your message (pretending to be Alice) with a private key you made up yourself, since you don't have access to Alice's private key. The receiver, checking the signature with Alice's real public key, will get the message that the signature is invalid, and his impression will be that someone tried to pretend to be Alice, which is true: You tried. But failed. btw: Would you really think that if it was *that* easy to fool, anyone would use that stuff? Regards, JO --------------------------------------------------------------------------- Free 30-day trial: firewall with virus/spam protection, URL filtering, VPN, wireless security Protect your network against hackers, viruses, spam and other risks with Astaro Security Linux, the comprehensive security solution that combines six applications in one software solution for ease of use and lower total cost of ownership. Download your free trial at http://www.securityfocus.com/sponsor/Astaro_security-basics_040301 ----------------------------------------------------------------------------
Current thread:
- RE: Encryption question David Gillett (Mar 01)
- <Possible follow-ups>
- RE: Encryption question Marco Araujo (Mar 01)
- Re: Encryption question F.O. Bossert (Mar 02)
- Re: Encryption question Joerg Over Dexia (Mar 02)
- Re: Encryption question D.E. Chadbourne (Mar 03)
- Re: Encryption question F.O. Bossert (Mar 02)
- RE: Encryption question Daniel Menezes (Mar 02)
- RE: Encryption question Preston, Tony (Mar 02)
- Re: Encryption question Hector Luis Gimbatti (Mar 03)
- RE: Encryption question Daniel Menezes (Mar 04)