From: Bruce Stephens on
adacrypt <austin.obyrne(a)hotmail.com> writes:

[...]

> The secure delivery of the initial copy database from Alice to Bob is
> something that they should be good at ? - other it is their problem.

So it's useless for most current uses of HTTPS.

You're mistaken if you think this is a one-off delivery: it needs to be
repeated each time there's a possibility of compromise, and each time
the communications (for whatever reason) get out of sync.

For the former, imagine two offices using it: what happens when an
employee leaves? Presumably if that employee had access (or might have
had access) to the database, you need to destroy it and start again.

That becomes more expensive in the common situation that an office
communicates with more than one other office (perhaps with multiple
suppliers or customers). In that case, *all* of the databases
potentially need to be replaced if an employee leaves (or if there's
some chance that databases have been compromised in some other way).

[...]

From: adacrypt on
On Jul 17, 11:19 am, Bruce Stephens <bruce
+use...(a)cenderis.demon.co.uk> wrote:
> adacrypt <austin.oby...(a)hotmail.com> writes:
>
> [...]
>
> > It matters not that the mathematics is asymmetric or symmetric - its
> > the overall security that counts
>
> You've no idea what asymmetric cryptography provides, do you?
>
> [...]

Hi,

It matters nothing to me what your conception of being asymmetric is -
I have stated what I understand it to be and I also point out that its
is not normal mathematical terminology or even a jargon word in
mathematics - all of mathematics and especially Algebra is intensely
asymmetric - youv'e been conned by a salient piece of spin that enates
from the RSA cipher - clearly they believed there would never again be
even a remote challenge and they way was clear stake out their own
publicity goalposts that would last for all time.

I do not depend on whatever you want asymmetric to mean as some form
of class name - my cryptography is secured by randomness - end of
story, finish - I don't want to join your asymmetric club no matter
what you say I don't understand about it - I don't need it - cheers -
adacrypt
From: adacrypt on
On Jul 17, 4:02 pm, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk>
wrote:
> adacrypt <austin.oby...(a)hotmail.com> writes:
>
> [...]
>
> > The secure delivery of the initial copy database from Alice to Bob is
> > something that they should be good at ? - other it is their problem.
>
> So it's useless for most current uses of HTTPS.
>
> You're mistaken if you think this is a one-off delivery: it needs to be
> repeated each time there's a possibility of compromise, and each time
> the communications (for whatever reason) get out of sync.
>
> For the former, imagine two offices using it: what happens when an
> employee leaves?  Presumably if that employee had access (or might have
> had access) to the database, you need to destroy it and start again.
>
> That becomes more expensive in the common situation that an office
> communicates with more than one other office (perhaps with multiple
> suppliers or customers).  In that case, *all* of the databases
> potentially need to be replaced if an employee leaves (or if there's
> some chance that databases have been compromised in some other way).
>
> [...]

Hi, Your'e getting too far ahead of the posse here - from my point of
view the mathematical core is untouchable and my remit ends there -
the rest is infrastructure management which is outside of my
experience but I have no doubt that there are solutions to every
problem you postulate - trading punches on hypothetical cases is a
ridiculous at this early stage of development - keep on taking the
tablets - cheers - adacrypt
From: Bruce Stephens on
adacrypt <austin.obyrne(a)hotmail.com> writes:

[...]

> It matters nothing to me what your conception of being asymmetric is -
> I have stated what I understand it to be and I also point out that its
> is not normal mathematical terminology or even a jargon word in
> mathematics - all of mathematics and especially Algebra is intensely
> asymmetric -

It's a technical cryptographic term, and you're right to imply that it's
very recent. The concept didn't (publically) exist before 1976. RSA
came a little later.

> youv'e been conned by a salient piece of spin that enates from the RSA
> cipher

Wrong. The idea predates RSA, and RSA was never the only asymmetric
system.

> - clearly they believed there would never again be even a remote
> challenge and they way was clear stake out their own publicity
> goalposts that would last for all time.

Nonsense, you're just making that up. RSA was not the only system and
isn't now. RSA is in no way in competition with any symmetric systems
and never has been; there was competition with DSA, and still is
sometimes.

[...]

> I don't need it - cheers - adacrypt

Yes you do. You use it every time you pay for something over the
internet (it's what ensures that the web server you're communicating
with is the one it claims to be, as well as being involved in generating
the session key for confidentiality). Most likely you use it every time
you check your email or send a usenet article.

You don't think you do because you don't understand what it does.
From: adacrypt on
On Jul 17, 4:31 pm, Bruce Stephens <bruce+use...(a)cenderis.demon.co.uk>
wrote:
> adacrypt <austin.oby...(a)hotmail.com> writes:
>
> [...]
>
> > It matters nothing to me what your conception of being asymmetric is -
> > I have stated what I understand it to be and I also point out that its
> > is not normal mathematical terminology or even a jargon word in
> > mathematics - all of mathematics and especially Algebra is intensely
> > asymmetric -
>
> It's a technical cryptographic term, and you're right to imply that it's
> very recent.  The concept didn't (publically) exist before 1976.  RSA
> came a little later.
>
> > youv'e been conned by a salient piece of spin that enates from the RSA
> > cipher
>
> Wrong.  The idea predates RSA, and RSA was never the only asymmetric
> system.
>
> > - clearly they believed there would never again be even a remote
> > challenge and they way was clear stake out their own publicity
> > goalposts that would last for all time.
>
> Nonsense, you're just making that up.  RSA was not the only system and
> isn't now.  RSA is in no way in competition with any symmetric systems
> and never has been; there was competition with DSA, and still is
> sometimes.
>
> [...]
>
> > I don't need it - cheers - adacrypt
>
> Yes you do.  You use it every time you pay for something over the
> internet (it's what ensures that the web server you're communicating
> with is the one it claims to be, as well as being involved in generating
> the session key for confidentiality).  Most likely you use it every time
> you check your email or send a usenet article.
>
> You don't think you do because you don't understand what it does.

Hi ,
>Yes you do. You use it every time you pay for something over the
>internet (it's what ensures that the web server you're communicating
>with is the one it claims to be, as well as being involved in generating
>the session key for confidentiality). Most likely you use it every time
>you check your email or send a usenet article.

Ok , these are latent uses that I clearly don't appreciate but as far
as my interest in the application of mathematics to cipher deisign
goes I rely only on randomness - I take on board what you are saying
but this a tertiary benefit the public evolving from skillful
management that is way over my head - infrasrtucture fallout
orientated maybe ? - regards - adacrypt