Eddy Nigg (StartCom Ltd.) wrote:
Hi Robert,

I just wondered about that one:

Robert Relyea wrote:
There is also a critical difference between the Hashing and the keysize..... Once a CA chooses it's keysize, then all certs signed by that CA will be signed with that key. If 1024 bits is weak, the CA can't issue a new subordinate CA which is signed with a 2048 bit signature (and vice versa).
And why not?
Because the CA's key determines the size and characteristic of it's signature. An RSA 1024 bit key can only produce RSA 1024-bit signature (not an RSA 2048, or a DSA, or ECDSA signature). NOTE, I did not say the subordinates' key size had to match the CA, only the signature on that subordinate must match the CA's key. This is not true of the Hashing algorithm, which is (relatively) independent of the CA's key. If the (self-signed) CA is signed using SHA1, that doesn't prevent the CA from signing it's subordinate Certs with SHA-256.

bob

--
Regards
Signer: Eddy Nigg, StartCom Ltd.
Jabber:      [EMAIL PROTECTED]
Phone:       +1.213.341.0390

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to