[Strint-attendees] "How to Expose an Eavesdropper"

"Steven M. Bellovin" <smb@cs.columbia.edu> Sat, 01 March 2014 11:41 UTC

Return-Path: <smb@cs.columbia.edu>
X-Original-To: strint-attendees@lists.i1b.org
Received: from buckwheat.cc.columbia.edu (buckwheat.cc.columbia.edu [128.59.72.251]) by diego.dreamhost.com (Postfix) with ESMTP id AECA048453 for <strint-attendees@lists.i1b.org>; Sat, 1 Mar 2014 03:41:10 -0800 (PST)
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250]) by buckwheat.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id s21BeR9w003492 for <strint-attendees@lists.i1b.org>; Sat, 1 Mar 2014 06:41:10 -0500
Received: from hazelnut (localhost.localdomain [127.0.0.1]) by hazelnut (Postfix) with ESMTP id 03AE66C for <strint-attendees@lists.i1b.org>; Sat, 1 Mar 2014 06:41:10 -0500 (EST)
Received: from rambutan.cc.columbia.edu (rambutan.cc.columbia.edu [128.59.29.5]) by hazelnut (Postfix) with ESMTP id E38FC6C for <strint-attendees@lists.i1b.org>; Sat, 1 Mar 2014 06:41:09 -0500 (EST)
Received: from [10.9.0.214] (fireball.cs.columbia.edu [128.59.13.10]) (user=smb2132 mech=PLAIN bits=0) by rambutan.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id s21Bf7MU015056 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for <strint-attendees@lists.i1b.org>; Sat, 1 Mar 2014 06:41:09 -0500 (EST)
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Message-Id: <6545CF2B-0CD2-4C91-83F3-6700FC4FC119@cs.columbia.edu>
Date: Sat, 01 Mar 2014 11:41:06 +0000
To: "<strint-attendees@lists.i1b.org>" <strint-attendees@lists.i1b.org>
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
X-Mailer: Apple Mail (2.1874)
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.5
Subject: [Strint-attendees] "How to Expose an Eavesdropper"
X-BeenThere: strint-attendees@lists.i1b.org
X-Mailman-Version: 2.1.14
Precedence: list
List-Id: STRINT Workshop Discussion List <strint-attendees-i1b.org>
List-Unsubscribe: <http://lists.i1b.org/options.cgi/strint-attendees-i1b.org>, <mailto:strint-attendees-request@lists.i1b.org?subject=unsubscribe>
List-Archive: <http://lists.i1b.org/pipermail/strint-attendees-i1b.org>
List-Post: <mailto:strint-attendees@lists.i1b.org>
List-Help: <mailto:strint-attendees-request@lists.i1b.org?subject=help>
List-Subscribe: <http://lists.i1b.org/listinfo.cgi/strint-attendees-i1b.org>, <mailto:strint-attendees-request@lists.i1b.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Mar 2014 11:41:10 -0000

Let me point people at Rivest and Shamir's "How to Expose an Eavesdropper" (https://people.csail.mit.edu/rivest/RivestShamir-HowToExposeAnEavesdropper.pdf) -- the technique may be useful for some situations.

		--Steve Bellovin, https://www.cs.columbia.edu/~smb