Future proofing? The history of encryption is riddled with examples of
overconfidence.

On Fri, Oct 27, 2023 at 2:02 PM John Levine <[email protected]> wrote:

> It appears that Scott Kitterman  <[email protected]> said:
> >On October 27, 2023 2:56:30 PM UTC, "Murray S. Kucherawy" <
> [email protected]> wrote:
> >>On Sun, Oct 1, 2023 at 1:50 AM Jan Dušátko <jan=
> [email protected]>
> >>wrote:
> >>
> >>> I would like to ask to consider the possibility of defining a DKIM
> >>> signature using Ed448. [...]
>
> >My view is that more encryption algorithms are bad for interoperability.
> For DKIM signing/verifying to work, senders
> >and verifiers need a common algorithm.  More choices make this more
> complex to achieve.
> >
> >We standardized ed25119 as a hedge against unknown vulnerability in RSA.
> ...
>
> Since we already have ed25519, why would we want ed448?  If ed25519 is a
> ten ton steel
> door on our cardboard box, ed448 is a fifteen ton steel door.
>
> R's,
> John
>
> _______________________________________________
> Ietf-dkim mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/ietf-dkim
>
_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to