I'll agree with your statement, and am quite familiar with that tennant of cryptographic reasearch. Unfortunately your comparison is not a particularly accurate one.

A cryptographic algorithm is secure if the algorithm is public, but the security is derived from a key which is kept secret. Both symetric and asymetric (ie: conventional and public-key) systems do have at least one key which must be kept secret for the transfer to be secure.

What we are attempting to create here is a secure system which has no secrets at all. There's nothing to be secret about the TeS system, besides the algorithm itself. There's no separable "secret key". This makes it significantly more difficult, if not impossible, to secure if the algorithm itself is public.

At 06:42 PM 10/28/2002 +0000, Paul Makepeace wrote:

This seems rather a sweeping statement as though fact. One of the key
tenets in cryptography for example is that the algorithm is secure
*despite* being fully revealed. So there is no causal link between a
system's function being open to examination and it being open to abuse


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Razor-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/razor-users

Reply via email to