[3641] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: DCSB: Risk Management is Where the Money Is; Trust in Digital Comm

daemon@ATHENA.MIT.EDU (Ian Brown)
Fri Nov 13 12:19:27 1998

Date: Fri, 13 Nov 1998 14:56:21 +0000
From: Ian Brown <I.Brown@cs.ucl.ac.uk>
To: Enzo Michelangeli <em@who.net>
CC: cryptography <cryptography@c2.net>

> Uhm, I see. But in that case, what happens if someone gets a (non-escrowed)
> DSA cert, and uses it for a secure web server only supporting the
> SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA ciphersuite (ephemeral Diffie-Hellman
> authenticated with DSS)? Strong, MIM-attack-resistant, and required by TLS
> for minimum compliance (and, HOPEFULLY, some day supported by popular
> browsers...)

Although it isn't clear if this will happen (or even if the govt. has
realised the possibility), the CA could set keyUsage flags in the
certificate to stop a DSA cert from authenticating a strong encryption key
at all, or limit authenticated encryption key length to 40 bits, or not
allow any further certification by that key. The wonders of X.509...

Ian.

home help back first fref pref prev next nref lref last post