A brief comparison of email encryption protocols
Adam Shostack
adam at lighthouse.homeport.org
Fri Mar 1 22:22:25 PST 1996
Alex Strasheim wrote:
| What's the advantage of using this url type system instead of "fully
| qualified" certificates, ie., attaching all the keys and signatures to the
| object? Doesn't the give and take with the key servers more than wipe out
| the advantage of the smaller data object?
|
| Does the win come from solving the revocation problem?
The win from a referenced system can come in two places.
First is standard places for keys, so I can ask a host for its telnetd's
key simply. Second is that I may already have cached some of the
keys, and not need, for example, they key for toad.com/s/sendmail/
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
More information about the cypherpunks-legacy
mailing list