On 31/1/09 17:08, Paul Hoffman wrote:
On 31/1/09 03:56, Kyle Hamilton wrote:
The PKIX standard can deal with problems of this extent.
If an implementation of the standard cannot, then the implementation
is nonconforming, and cannot be expected to interoperate.
Do you mean, an implementation
At 12:29 PM +0100 2/1/09, Ian G wrote:
On 31/1/09 17:08, Paul Hoffman wrote:
If a trust anchor has a CRL that is too large for for the implementation to
handle, the implementation MUST remove that trust anchor from its pile.
Wouldn't it be better to mark those certificates in the same way as
good evening, what are currently the most secure algorithms? (also hash
algorithms)..
Michael
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Michael Kohler wrote, On 2009-02-01 12:34:
good evening, what are currently the most secure algorithms? (also hash
algorithms)..
I suggest you consult
http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf
Tables 2 and 2, pages 63 64, and surrounding text.
--
dev-tech-crypto
4 matches
Mail list logo