----- Original Message -----
From: "Eric Rescorla" <[EMAIL PROTECTED]>
To: "Eugene Leitl" <[EMAIL PROTECTED]>
Sent: Monday, 28 January, 2002 6:33 AM

[...]
> If you want to see EC used you need to describe a specific algorithm
> which has the following three properties:
>
> (1) widely agreed to be unencumbered, particularly by the big players.
>     [extra points if you're willing to indemnify]
> (2) significantly better than RSA (this generally means faster)
> (3) has seen a significant amount of analysis so that we can have
> some reasonable confidence it's secure.
>
> Until someone does that, the cost of information in choosing an
> EC algorithm is simply too high to justify replacing RSA in
> most applications.

Well, a nice characteristic that RSA doesn't have is the ability of using as
secret key a hash of the passphrase, which avoids the need of a secret
keyring and the relative vulnerability to dictionary attacks. See e.g. the
Pegwit application, which, in its version 9
(http://groups.yahoo.com/group/pegwit/) does not, AFAIK, infringe on any EC
patent.

Enzo




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to