Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: debugging encrypted part of isakmp
From: Andriy Gapon (avgicyb.net.ua)
Date: Thu Jan 20 2005 - 08:10:09 CST
on 14.01.2005 17:53 Andriy Gapon said the following:
> I see. I think it should not be too hard theoretically to write a
> program that would do such decryption offline, using code from isakmpd
> or racoon, and playing for both sides to deduce internal state/random
> values that original parties used. But that's definitely a lot of work.
Looks like wrote nonsence and what I wanted was to break Diffie-Hellman
exchange or to derive DH shared key using encrypted information and
knowing certain parts of original information, both of which are either
not feasible or too hard.
Sorry for wasting your time.
freebsd-securityfreebsd.org mailing list
To unsubscribe, send any mail to "freebsd-security-unsubscribefreebsd.org"