Robert Snively wrote: > Then I suggest that the second sentence say something like: > > "The cryptographic transform must therefore provide > reasonable protection against undetected manipulation of > ciphertext by an attacker."
Sounds good to me. John Geldman wrote: > [...] > This seems like an opportunity for a little more in the scope following > the proposed sentences: > > "The LRW-AES transform and the key-export format are only a portion of a > secure shared storage media solution. Authentication and authorization > protocols are beyond the scope of this specification." Also sounds good. -- Shai