From: Bruce Stephens on 17 Jul 2010 11:02 adacrypt <austin.obyrne(a)hotmail.com> writes: [...] > The secure delivery of the initial copy database from Alice to Bob is > something that they should be good at ? - other it is their problem. So it's useless for most current uses of HTTPS. You're mistaken if you think this is a one-off delivery: it needs to be repeated each time there's a possibility of compromise, and each time the communications (for whatever reason) get out of sync. For the former, imagine two offices using it: what happens when an employee leaves? Presumably if that employee had access (or might have had access) to the database, you need to destroy it and start again. That becomes more expensive in the common situation that an office communicates with more than one other office (perhaps with multiple suppliers or customers). In that case, *all* of the databases potentially need to be replaced if an employee leaves (or if there's some chance that databases have been compromised in some other way). [...]
From: adacrypt on 17 Jul 2010 11:07 On Jul 17, 11:19 am, Bruce Stephens <bruce +use...(a)cenderis.demon.co.uk> wrote: > adacrypt <austin.oby...(a)hotmail.com> writes: > > [...] > > > It matters not that the mathematics is asymmetric or symmetric - its > > the overall security that counts > > You've no idea what asymmetric cryptography provides, do you? > > [...] Hi, It matters nothing to me what your conception of being asymmetric is - I have stated what I understand it to be and I also point out that its is not normal mathematical terminology or even a jargon word in mathematics - all of mathematics and especially Algebra is intensely asymmetric - youv'e been conned by a salient piece of spin that enates from the RSA cipher - clearly they believed there would never again be even a remote challenge and they way was clear stake out their own publicity goalposts that would last for all time. I do not depend on whatever you want asymmetric to mean as some form of class name - my cryptography is secured by randomness - end of story, finish - I don't want to join your asymmetric club no matter what you say I don't understand about it - I don't need it - cheers - adacrypt
From: adacrypt on 17 Jul 2010 11:20 On Jul 17, 4:02 pm, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk> wrote: > adacrypt <austin.oby...(a)hotmail.com> writes: > > [...] > > > The secure delivery of the initial copy database from Alice to Bob is > > something that they should be good at ? - other it is their problem. > > So it's useless for most current uses of HTTPS. > > You're mistaken if you think this is a one-off delivery: it needs to be > repeated each time there's a possibility of compromise, and each time > the communications (for whatever reason) get out of sync. > > For the former, imagine two offices using it: what happens when an > employee leaves? Presumably if that employee had access (or might have > had access) to the database, you need to destroy it and start again. > > That becomes more expensive in the common situation that an office > communicates with more than one other office (perhaps with multiple > suppliers or customers). In that case, *all* of the databases > potentially need to be replaced if an employee leaves (or if there's > some chance that databases have been compromised in some other way). > > [...] Hi, Your'e getting too far ahead of the posse here - from my point of view the mathematical core is untouchable and my remit ends there - the rest is infrastructure management which is outside of my experience but I have no doubt that there are solutions to every problem you postulate - trading punches on hypothetical cases is a ridiculous at this early stage of development - keep on taking the tablets - cheers - adacrypt
From: Bruce Stephens on 17 Jul 2010 11:31 adacrypt <austin.obyrne(a)hotmail.com> writes: [...] > It matters nothing to me what your conception of being asymmetric is - > I have stated what I understand it to be and I also point out that its > is not normal mathematical terminology or even a jargon word in > mathematics - all of mathematics and especially Algebra is intensely > asymmetric - It's a technical cryptographic term, and you're right to imply that it's very recent. The concept didn't (publically) exist before 1976. RSA came a little later. > youv'e been conned by a salient piece of spin that enates from the RSA > cipher Wrong. The idea predates RSA, and RSA was never the only asymmetric system. > - clearly they believed there would never again be even a remote > challenge and they way was clear stake out their own publicity > goalposts that would last for all time. Nonsense, you're just making that up. RSA was not the only system and isn't now. RSA is in no way in competition with any symmetric systems and never has been; there was competition with DSA, and still is sometimes. [...] > I don't need it - cheers - adacrypt Yes you do. You use it every time you pay for something over the internet (it's what ensures that the web server you're communicating with is the one it claims to be, as well as being involved in generating the session key for confidentiality). Most likely you use it every time you check your email or send a usenet article. You don't think you do because you don't understand what it does.
From: adacrypt on 17 Jul 2010 11:50
On Jul 17, 4:31 pm, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk> wrote: > adacrypt <austin.oby...(a)hotmail.com> writes: > > [...] > > > It matters nothing to me what your conception of being asymmetric is - > > I have stated what I understand it to be and I also point out that its > > is not normal mathematical terminology or even a jargon word in > > mathematics - all of mathematics and especially Algebra is intensely > > asymmetric - > > It's a technical cryptographic term, and you're right to imply that it's > very recent. The concept didn't (publically) exist before 1976. RSA > came a little later. > > > youv'e been conned by a salient piece of spin that enates from the RSA > > cipher > > Wrong. The idea predates RSA, and RSA was never the only asymmetric > system. > > > - clearly they believed there would never again be even a remote > > challenge and they way was clear stake out their own publicity > > goalposts that would last for all time. > > Nonsense, you're just making that up. RSA was not the only system and > isn't now. RSA is in no way in competition with any symmetric systems > and never has been; there was competition with DSA, and still is > sometimes. > > [...] > > > I don't need it - cheers - adacrypt > > Yes you do. You use it every time you pay for something over the > internet (it's what ensures that the web server you're communicating > with is the one it claims to be, as well as being involved in generating > the session key for confidentiality). Most likely you use it every time > you check your email or send a usenet article. > > You don't think you do because you don't understand what it does. Hi , >Yes you do. You use it every time you pay for something over the >internet (it's what ensures that the web server you're communicating >with is the one it claims to be, as well as being involved in generating >the session key for confidentiality). Most likely you use it every time >you check your email or send a usenet article. Ok , these are latent uses that I clearly don't appreciate but as far as my interest in the application of mathematics to cipher deisign goes I rely only on randomness - I take on board what you are saying but this a tertiary benefit the public evolving from skillful management that is way over my head - infrasrtucture fallout orientated maybe ? - regards - adacrypt |