[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Australian "Walsh" report exposes the hole in key escrow
John Davidson wrote:
> The US National Institute of Standards and Technology recently made a
> worldwide plea for cryptography algorithms that can be used for
> authentication and not for encryption.
And, of course, cannot be used to authenticate encryption keys. Oh, but
they're just binary data, aren't they? So those Evil Terrorists(tm) will
simply use their magic authentication-only keys to authenticate their
secret un-surrendered encryption keys and they're off.
SignatureMonger