[743] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Securing plaintext following receipt

daemon@ATHENA.MIT.EDU (Steve)
Wed May 7 21:28:58 1997

To: "A. Padgett Peterson P.E. Information Security" <PADGETT@hobbes.orl.mmc.com>
cc: cryptography@c2.net
In-reply-to: Your message of "Wed, 07 May 1997 19:50:05 EDT."
             <970507195005.2061db8f@hobbes.orl.mmc.com> 
Date: Wed, 07 May 1997 17:47:21 -0700
From: Steve <steve@edmweb.com>

> Have for some time been promoting the concept of three types of
> encryption:
> 1) data
> 2) volume
> 3) channel

Data and volume encryption aren't all that different. I think it can be
reduced further:

1- End-point security. Consists of file/disk encryption, tamper
resistant hardware, armed guards, etc. 

2- Communications channel security. Secures data between end points.
Consists of public key methods (PGP, S/MIME, SSL), quantum crypto, etc.

When a message leaves an end-point, all end-point security can be
stripped off and communications channel security takes over. When a
message arrives at an end-point, the communications channel security is
stripped off and end-point security takes over. This allows the two to
be completely seperate.

Digital signatures on email messages can (rather conveniently) be
considered part of the message. Yet another reason to sign before
encrypting.

home help back first fref pref prev next nref lref last post