Re: Policy: revoke on private key exposure

2009-02-01 Thread Ian G
On 31/1/09 17:08, Paul Hoffman wrote: On 31/1/09 03:56, Kyle Hamilton wrote: The PKIX standard can deal with problems of this extent. If an implementation of the standard cannot, then the implementation is nonconforming, and cannot be expected to interoperate. Do you mean, an implementation

Re: Policy: revoke on private key exposure

2009-02-01 Thread Paul Hoffman
At 12:29 PM +0100 2/1/09, Ian G wrote: On 31/1/09 17:08, Paul Hoffman wrote: If a trust anchor has a CRL that is too large for for the implementation to handle, the implementation MUST remove that trust anchor from its pile. Wouldn't it be better to mark those certificates in the same way as

most secure algorithms

2009-02-01 Thread Michael Kohler
good evening, what are currently the most secure algorithms? (also hash algorithms).. Michael -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: most secure algorithms

2009-02-01 Thread Nelson B Bolyard
Michael Kohler wrote, On 2009-02-01 12:34: good evening, what are currently the most secure algorithms? (also hash algorithms).. I suggest you consult http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf Tables 2 and 2, pages 63 64, and surrounding text. -- dev-tech-crypto