Steve Kent> 2. Support key management for data origin authentication,
integrity, and non-repudiation (digital signature)
This does not seem to be a goal to me. It smacks more of a solution.
What is a proper goal that could replace this? How about...
2. Identify the sender of a message to (a) the satisfaction of the
receiver, or (b) to the satisfaction of a civil court of law or (c) to
the satisfaction of a criminal court of law.
There could be vastly different responses to the goal, depending on how
it is written. Note also that the three levels indicated above will
give vastly different responses as well. Key management is one of the
solutions used in furtherance of the above goals, and also will vary
depending on the level of assurance requested.
The wording of the goals statement, and the response by Steve Crocker
have thrust the discussion immediately into details of the PEM RFC's and
proposed changes to them, without really looking at the goals
themselves. If we are truly interested in re-evaluating the goals, then
we should do that, and come up with a list that a wide range of
interests could support.
Peace ..Tom