More secure use of DSA?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> So what's your proposed method of combining algorithms?? You reject the
> commonly accepted approach, but when asked to offer an alternative, you
> start evading? Do you have no alternative then?

Start evading.  Sheesh.

I made a casual comment and said YMMV, encouraging disagreement.  Now I find myself being challenged.  I am not thrilled with the tenor of this conversation.

The needs of encryption aren't necessarily equivalent to the needs of authentication, nor digesting.  Nobody has ever shown that they have to be equivalent strength.  Why do they have to be?  It's just asserted that they should match.  I don't buy into that assertion, and will, instead, turn the question back: why do they have to be?  


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux