Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 Nov 1999 12:56:56 -0800 (PST)
From:      Kris Kennaway <kris@hub.freebsd.org>
To:        James Wyatt <jwyatt@rwsystems.net>
Cc:        Dug Song <dugsong@monkey.org>, Niels Provos <provos@citi.umich.edu>, security@FreeBSD.ORG, markus@openbsd.org
Subject:   Re: OpenSSH patches 
Message-ID:  <Pine.BSF.4.10.9911021254310.73778-100000@hub.freebsd.org>
In-Reply-To: <Pine.BSF.4.10.9911021151531.78894-100000@bsdie.rwsystems.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 2 Nov 1999, James Wyatt wrote:

> I was under the impression that the RSA code was best for ApacheSSL
> support and anything else (like ssh) could use several others (DES,
> BlowFish, etc...).

There's a fundamental difference between public-key algorithms like RSA,
and symmetric algorithms like DES and Blowfish. RSA is used for key
distribution in SSH where you have a private key on your client and the
corresponding public key on the server. YOu can't use a symmetric
algorithm to do that (altough there are non-restricted Public-key
algorithms which could be used to replace RSA).

You can still use it in "password" mode, which uses the UNIX account
password to generate a key for a symmetric algorithm like Blowfish.

Kris

----
Cthulhu for President! For when you're tired of choosing the _lesser_ of
two evils..



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9911021254310.73778-100000>