On Thu, 29 Mar 2001 12:19:09   Wayne Wilson wrote:
...
>>> But what are  you trying to protect from destruction?  The hash, the original bit
>>> stream that created the hash or the link between the original bit stream and 
>>> the hash?  Once again, let's be clear about what we are talking about.
>> 
>> 
>> Hi Wayne,
>>   Sorry if I was not clear enough. The answer is all of the above.
>>
>Well, maybe you do have a single protocol that can do all of it, but
>my thinking so far has involved a more modular, separation of function approach.

Care to be describe what you have in mind?
 
We already discussed how Horst's method + Eternity service. These "modular" things 
don't add up in a simple way!!

>>   It is a very important problem that I have been working on for 3 years. 
>> That is why I am challenging all of you to examine my solution! :-)
>I am not a crypto expert so I would not be able to pass 
>judgement on your protocol or your algorithms.  

Fair enough. Before one should even consider designing a protocol or cryto, it is 
helpful to first analyze other people's protocols. 

...

>you really do need a few folks 
>like Ross Anderson to publish reviews on your system, which 
>means you need to take it to the cryptographic community, 
>not the health care systems community.

Good idea.
It was reviewed in 1999 and published last year. :-)

...
>This is a well known approach, it is how HL7 adopted digital 
>signature over messaging by profiling EDIINT specs,  which 
>in turn, profiles S/MIME and PGP/MIME.

These are implementation issues which are also important. However, even before getting 
to the implementation details, it is essential to analyze the protocol.

The starting point is : What are you trying to achieve?
What are the threats/risks that you are trying to contain?

Best regards,

Andrew
---
Andrew P. Ho, M.D.
OIO: Open Infrastructure for Outcomes
www.TxOutcome.Org
Assistant Clinical Professor
Department of Psychiatry, Harbor-UCLA Medical Center
University of California, Los Angeles


Join 18 million Eudora users by signing up for a free Eudora Web-Mail account at 
http://www.eudoramail.com

Reply via email to