[365] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Digital Signatures

daemon@ATHENA.MIT.EDU (weboland@globalkey.com)
Mon Mar 17 12:15:20 1997

From: weboland@globalkey.com
Date: Mon, 17 Mar 1997 10:09:54 -0700
To: cryptography@c2.net


Perry / Adam:
=0ARegarding your term "keyed hash".  Are you including in
this term the methodology in which a message hash is "encrypted" with a
symmetric algorithm using a "shared" secret key?
=0A  As with any method
used, the basis for user authentication is two-fold:
  1.  Is there
adequate binding between the user and the "secret" value, and =

  2. =

Has this binding been compromised?
=0AI would think that, in some
applications where the pairwise authentication is limited, the above
requirements can be met at higher levels of assurance using symmetric
and/or secret sharing methodologies (assuming adequate encryption
parameters,  secret key exchange methodologies, and etc.) in that a
trusted third party (i.e. a 'CA') could be removed from the trust
model.
=0AWalt

home help back first fref pref prev next nref lref last post