How many algorithms do you think is enough and why? Scott K
On October 28, 2023 10:54:42 PM UTC, Thomas Vincent <[email protected]> wrote: >Future proofing? The history of encryption is riddled with examples of >overconfidence. > >On Fri, Oct 27, 2023 at 2:02 PM John Levine <[email protected]> wrote: > >> It appears that Scott Kitterman <[email protected]> said: >> >On October 27, 2023 2:56:30 PM UTC, "Murray S. Kucherawy" < >> [email protected]> wrote: >> >>On Sun, Oct 1, 2023 at 1:50 AM Jan Dušátko <jan= >> [email protected]> >> >>wrote: >> >> >> >>> I would like to ask to consider the possibility of defining a DKIM >> >>> signature using Ed448. [...] >> >> >My view is that more encryption algorithms are bad for interoperability. >> For DKIM signing/verifying to work, senders >> >and verifiers need a common algorithm. More choices make this more >> complex to achieve. >> > >> >We standardized ed25119 as a hedge against unknown vulnerability in RSA. >> ... >> >> Since we already have ed25519, why would we want ed448? If ed25519 is a >> ten ton steel >> door on our cardboard box, ed448 is a fifteen ton steel door. >> >> R's, >> John >> >> _______________________________________________ >> Ietf-dkim mailing list >> [email protected] >> https://www.ietf.org/mailman/listinfo/ietf-dkim >> _______________________________________________ Ietf-dkim mailing list [email protected] https://www.ietf.org/mailman/listinfo/ietf-dkim
