shibboleth-dev - RE: Encryption key strategies
Subject: Shibboleth Developers
List archive
- From: "Scott Cantor" <>
- To: <>
- Subject: RE: Encryption key strategies
- Date: Thu, 22 Jun 2006 00:26:57 -0400
- Organization: The Ohio State University
> Encryption with asymmetric keys usually means using them to
> negotiate a shared symmetric key. Is there some mechanism
> to do that?
XML Encryption has support for symmetric key transport using RSA encryption.
You encrypt the data with DES/AES and then encrypt the key with the peer's
key.
I asked around a little and determined that in SAML (or Liberty) land,
nobody's pushing much beyond per-message keys. Anything beyond that
involving negotiation of caching/reuse/derivation of keys wouldn't
interoperate, so that would be pretty far down the road I would say.
It's somewhat beside my point, which is that you have to start with the
public key in any case.
-- Scott
- Encryption key strategies, Scott Cantor, 06/21/2006
- Re: Encryption key strategies, Jim Fox, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/22/2006
- Re: Encryption key strategies, Jim Fox, 06/22/2006
Archive powered by MHonArc 2.6.16.