Re: [Gen-art] Gen Art LC review of: draft-turner-ecprivatekey-02.txt

2010-01-14 Thread Avshalom Houri
Sean, I am OK with the changes. I am not familiar with the right terms in this field however, masquerades sound to me as only one of the possible things that can be done by the person that gets the private key. They can also have access to encrypted material for example. Anyway if you think

Re: [Gen-art] Gen Art LC review of: draft-turner-ecprivatekey-02.txt

2010-01-14 Thread Sean Turner
Dan, I actually dug masquerade out of Williams Stallings' classic network security book, but I like impersonate more. spt Dan Brown wrote: Sean, Avshalom, Maybe ”impersonate” is more specific than “masquerade”, as the latter also connotes a party where the parties don masks. Also,

Re: [Gen-art] Gen Art LC review of: draft-turner-ecprivatekey-02.txt

2010-01-14 Thread Dan Brown
Sean, Avshalom, Maybe impersonate is more specific than masquerade, as the latter also connotes a party where the parties don masks. Also, impersonate has some precedence in cryptographic terminology. For example, American National Standard X9.63 for example lists an attack called Key