Digital Signing
Voltage Spike
plug-discuss@lists.plug.phoenix.az.us
Thu, 26 Sep 2002 10:51:55 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Wednesday, September 25, 2002, at 04:59 PM, Shawn Rutledge wrote:
> Is there any opportunity for reuse of keys, between SSL, SSH, PGP,
> Kerberos,
> etc?
I don't think that this would make sense? From my understanding, SSH,
SSL, and probably Kerberos use much shorter keys than PGP-style keys
due to the real-time nature of the transaction. It is not
computationally feasible to encrypt and decrypt data in real-time with
a 1024-bit or higher key. (Also, I believe that Kerberos uses a
different type of key system.)
Of course, I suppose that it could be handled like IPSEC. In other
words, use the extreme key-pair to validate the user at each end and
encrypt the "lesser" key (which may be randomly generated) to send
across for real-time communication. As far as I know, however, SSL is
already considered secure for some time to come.
- --
Voltage Spike
,,,
(. .)
- --ooO-(_)-Ooo--
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (Darwin)
iD8DBQE9k0lApNoctRtUIRQRAvVtAKCAEW4W8YgSo/ILe2dc/iKYM/1UWACbBmUF
0NqIIDCjNqOOHGVKRdR1aNQ=
=4RC6
-----END PGP SIGNATURE-----