[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Photuris questions
> From: Mike Roe <Michael.Roe@cl.cam.ac.uk>
> Re-using the same key with two different algorithms (or the same algorithm
> in two different modes) is a really bad thing to do:
>
You must be new to the list. We've already discussed this issue into
the ground. But of course, we will now have a flurry of pointless email
on this subject again from people who haven't bothered to read the
Security Architecture.
> If multiple use of the same key is to be permitted at all, the specification
> should contain some warning about why you shouldn;t do it.
>
No, the Photuris specification is about how to generate key material.
The Security Architecture and subordinate documents is the place to
discuss which algorithms to use whenever.
I have tried very hard _NOT_ to include material already in other documents,
except by reference. It's long enough already....
Bill.Simpson@um.cc.umich.edu
Key fingerprint = 2E 07 23 03 C5 62 70 D3 59 B1 4F 5E 1D C2 C1 A2