> There is a need to combine algorithms of different kind. Since the security of > the chain is that of its weakest links - it necessitates comparison between > those different algorithms. Only if you think everything has to be equally protected. That's the assertion I am not thrilled with. Sometimes knowing who sent it is more important -- the metadata -- and sometimes the content -- say, the value of the check -- is more important.