stribika-rdonly

Results 3 comments of stribika-rdonly

How would the protocol work, just n*(n-1)/2 one-to-one connections or like [mpOTR](https://www.cypherpunks.ca/~iang/pubs/mpotr.pdf)?

Can you post `ssh -v` output?

You are correct, SHA-1 collisions are not sufficient to break HMAC-SHA-1. I have no new attacks. Even [HMAC-MD5](https://crypto.stackexchange.com/questions/9336/is-hmac-md5-considered-secure) is safe. I did consider attacks on the hash function used as...