[8188] in cryptography@c2.net mail archive
migration paradigm (was: Is PGP broken?)
daemon@ATHENA.MIT.EDU (William Allen Simpson)
Mon Dec 4 09:35:14 2000
Message-ID: <3A2BA2CA.B6AD276A@greendragon.com>
Date: Mon, 04 Dec 2000 08:57:44 -0500
From: William Allen Simpson <wsimpson@greendragon.com>
MIME-Version: 1.0
To: cryptography@c2.net
Cc: dbird@varadm.com
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
David Bird wrote:
>
> In my opinion, cryptography should be seen as an evolutionary
> process. Protocols are continuously evaluated for their "fitness" in the
> context of current number theory, advances in computers/CPUs, and many
> individual/company/implementation specific requirements. It may be
> impossible to get the ideal solution, but we optimize to what we consider
> vital for survival.
>
I've read with interest the thread, and I'd thought that we all came
to this conclusion some years back. That's why we had the SPKI
response to PKIX, OpenPGP, etc.
We could use the excuse of AES implementation to foster a move to a
new common denominator. That implies a willingness among ourselves
to move, abandoning the older solutions (with perhaps some migration
and translation programs to process archived information).
I once (circa 1996-1997) tried to foster this with PSPKI (Pretty Simple Public Key Infrastructure), combining what I saw as
the strengths of
OpenPGP, SPKI, SPEKE, etc. Maybe it's time to try again?
My requirements were (off the top of my head, there were more):
1) simple, easy to process and debug data formats. Like SPKI and
KeyNote, not PKIX or even OpenPGP.
2) possibility of translation of public keys between systems (but
not the OpenPGP "sub-packets") for easier migration.
3) explicit inclusion of roles and capabilities. There are many
flavors of this -- I simply indicated a "group" of things to be
signed, but KeyNote attributes might serve better.
4) an agreed algorithm for generating private keys directly from
the passphrase, rather than keeping a private key database.
Moving folks from laptop to desktop has been pretty hard, and
public terminals are useless. AFS/Kerberos did this with a
"well-known" string-to-key algorithm, and it's hard to convince
folks to use a new system that's actually harder to use. We need
to design for ease of use!
What support is there among us for evolving together?
Are there other requirements?
Is it time?