A brief comparison of email encryption protocols

Adam Shostack adam at lighthouse.homeport.org
Fri Mar 1 22:22:25 PST 1996


Alex Strasheim wrote:

| What's the advantage of using this url type system instead of "fully
| qualified" certificates, ie., attaching all the keys and signatures to the
| object?  Doesn't the give and take with the key servers more than wipe out
| the advantage of the smaller data object?
|
| Does the win come from solving the revocation problem?

	The win from a referenced system can come in two places.
First is standard places for keys, so I can ask a host for its telnetd's
key simply.  Second is that I may already have cached some of the
keys, and not need, for example, they key for toad.com/s/sendmail/

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume







More information about the cypherpunks-legacy mailing list