Now that we see the full detail of interactions required to verify a single message, I wonder if there was ever a time when the advantage of asymmetric versus symmetric key management was laid out. If anyone has an on-line reference to that decision, I would like to read it. As it appears from what has been dispalyed in the last several days, symmetric key management just might be simpler to implement and to user.
<Prev in Thread] | Current Thread | [Next in Thread> |
---|---|---|
|
Previous by Date: | Re: Is DER required, Steve Kent |
---|---|
Next by Date: | NIST and PKP agree re DSA license, Robert W. Shirey |
Previous by Thread: | Anderson's RSA Trapdoor Can Be Broken, Burt Kaliski |
Next by Thread: | Re: Asymmetric key management, Steve Kent |
Indexes: | [Date] [Thread] [Top] [All Lists] |