Robert Snively wrote:
> Then I suggest that the second sentence say something like:
> 
> "The cryptographic transform must therefore provide
> reasonable protection against undetected manipulation of 
> ciphertext by an attacker." 

Sounds good to me.

John Geldman wrote:
> [...]
> This seems like an opportunity for a little more in the scope following
> the proposed sentences:
> 
> "The LRW-AES transform and the key-export format are only a portion of a
> secure shared storage media solution. Authentication and authorization
> protocols are beyond the scope of this specification."

Also sounds good.

-- Shai

Reply via email to