Mok-Kong Shen (mok-kong.shen@stud.uni-muenchen.de)
Wed, 16 Sep 1998 16:19:15 +0100
mgraffam@mhv.net wrote:
>
> I can imagine an attacker killing all the TESS servers in order to
> frustrate the attempts of a person to send a 'sealed' document on the hope
> that if the attack delays communication long enough the victim will send
> the document in the clear due to a combination of frustration, and need to
> get the information to the recieving party quickly.
I can see other problems. TESS server (with their substitutes) has
to be fundamentally a trusted agent. Question is whether user
can always trust him. If TESS server denies the proper receiver
the decryption aid for an incorrect reason (say, a third person
has bribed an employee running the server or the like) what can one
do? Can or do most users like have such a trusted agent? Also the
communication with the server provides possiblity of traffic
analysis. That may not be beneficial.
M. K. Shen
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:13:59