>> In my application there's a tradeoff between
>> sig length and security and in some instances a short sig
>> length, at the risk of some insecurity, will be the right answer.
>
>Who is the signer and who is the verifier. Can the signer and verifier
>engage in an on-line protocol? Are you signing traffic or stored data?
>
>OpenSSL signs (symmetric MAC) each "message" in an SSL session.
>Kerberos signs each message with an ephemeral session key...
>
>> Are there other algorithms I
>> should be looking at besides RSA to accomplish my goal.
>
>Algorithm selection is the easy part, the hard part is security analysis
>and protocol selection. What problem are you trying to solve?
>
>--
>    Viktor.

Sorry - more details:  This isn't a comm aplication - it amounts to
authentication of application data files.  The signer is an utility which
exists solely in a vendor's environment.  The verifier is an application
that exists in a consumer (potentially hostile) environment.  Hence
asymmetric key algorithms are a fit.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to