[15836] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: dual-use digital signature vulnerabilityastiglic@okiok.com

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Wed Jul 28 13:31:25 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: lynn@garlic.com, pgut001@cs.auckland.ac.nz
Cc: astiglic@okiok.com, cryptography@metzdowd.com,
	sws@cs.dartmouth.edu
In-Reply-To: <6.1.2.0.2.20040725133222.0387de40@mail.comcast.net>
Date: Tue, 27 Jul 2004 11:40:25 +1200

Anne & Lynn Wheeler <lynn@garlic.com> write:

>the assertion here is possible threat model confusion when the same exact
>technology is used for two significantly different business purposes.

I don't think there's any confusion about the threat model, which is "Users
find it too difficult to generate keys/obtain certs, so if the CA doesn't do
it for them the users will complain, or not become users at all".  Having the
CA generate the key addresses this threat model.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post