[sci.crypt] exponential key exchange

hingston@Apple.COM (Joe Hingston) (05/06/88)

Could soneone either describe to me or give me a good reference on the
details of how exponential key exchange works?  My understanding is that is 
useful in situations where the communication can be tapped, but not disrupted.
Supposedly the eavesdropper can tell that key exchange is taking place but    
cannot determine the actual keys.

Thanks in advance.

-- 
Joe Hingston            "A screaming comes across the sky"
Apple Computer, Inc.
(world!amdahl!apple!hingston)