If your messages are longer than the size of an AES or 3DES key, you're
less efficient.  If they're ever going to be longer, you're stuck. :)

> That is what I m showing the diagram? Or is my diagram wrong?  The only
> difference is I am using MD5.

MD5 should be avoided except where it has to be used for legacy apps.

Your message digest was encrypted by the recipient's key, not the senders.
Did I read your diagram wrong?  If not, then why keep the digest private?
Is sender authentication handled somewhere else?  What is to stop an
adversary from replacing the digest?  Etc.

> I will take a look at the commands, and read the RFC. Is there something
> specific I should be looking for?

General knowledge.

        /r$
--
Rich Salz                  Chief Security Architect
DataPower Technology       http://www.datapower.com
XS40 XML Security Gateway  http://www.datapower.com/products/xs40.html
XML Security Overview      http://www.datapower.com/xmldev/xmlsecurity.html

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to