[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Photuris questions



> From: Mike Roe <Michael.Roe@cl.cam.ac.uk>
> Re-using the same key with two different algorithms (or the same algorithm
> in two different modes) is a really bad thing to do:
>
You must be new to the list.  We've already discussed this issue into
the ground.  But of course, we will now have a flurry of pointless email
on this subject again from people who haven't bothered to read the
Security Architecture.


> If multiple use of the same key is to be permitted at all, the specification
> should contain some warning about why you shouldn;t do it.
>
No, the Photuris specification is about how to generate key material.
The Security Architecture and subordinate documents is the place to
discuss which algorithms to use whenever.

I have tried very hard _NOT_ to include material already in other documents,
except by reference.  It's long enough already....

Bill.Simpson@um.cc.umich.edu
          Key fingerprint =  2E 07 23 03 C5 62 70 D3  59 B1 4F 5E 1D C2 C1 A2