it boils down to this: symmetric crypto is much faster than asymmetric
crypto. Asymmetric crypto should only be used to exchange symmetric keys
and signing.


On Sat, Sep 7, 2013 at 11:10 AM, Jaap-Henk Hoepman <j...@cs.ru.nl> wrote:

>
> > I have also, in debate with Jerry, opined that public-key cryptography
> is a powerful thing that can't be replaced with symmetric-key cryptography.
> That's something that I firmly believe. At its most fundamental, public-key
> crypto allows one to encrypt something to someone whom one does not have a
> prior security relationship with. That is powerful beyond words.
>
> I share that belief. Hence my desire to fully understand Bruce's remark.
>
> Strictly speaking you need some kind of security relationship: you need to
> be sure the public key belongs to the intended recipient (and is under his
> sole control). So public key crypto allows you to bootstrap from some
> authentic piece of information (public key belongs to X) to a confidential
> communication channel (with X).
>
> Jaap-Henk
> _______________________________________________
> The cryptography mailing list
> cryptography@metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography
>
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to