Changes To Experiment: mmmv_symsig_t1
Not logged in

Changes to "Experiment: mmmv_symsig_t1" between 2017-10-09 23:36:07 and 2017-10-09 23:36:52

    39     39   attack</a>. To <b>probabilistically counter</b> the man-in-the-middle attack,
    40     40   the Bob and the Alice use the services of multiple KXS to agree a set of
    41     41   temporary encryption keys, one temporary key per one KXS. The Bob and the Alice
    42     42   use the temporary keys for onion-encrypting the actual data exchange between
    43     43   themselves. <b>If at least 2 KXS-es manage to keep the keys that they use for
    44     44   communicating with the Alice and with the Bob a secret and those same 2 KXS
    45     45   choose to keep the overheard temporary keys a secret, then absolutely no KXS is
    46         -able to decrypt the Bob's and Alice's onionencrypted session.</b></div>
           46  +able to decrypt the Bob's and the Alice's onionencrypted session.</b></div>
    47     47   
    48     48   <div><br>
    49     49   </div>
    50     50   
    51     51   <div><br>
    52     52   </div>
    53     53