× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Thank you, and sorry for the delay in reply (as I.. uhhhhh... got
side-tracked a "bit"...;-).

I was most interested in this part:  "If there are multiple layers of
encryption it is impossible to crack or decrypt them simultaneously.  ...
While it is true that additional layers would make things harder to crack,"

Because if an additional layer would make it harder to crack, then it sounds
like you mean "impossible" in the sense that it was "impossible" for the
Titanic to sink.  And I consider a crack-proof method of voting to be much
more critical than nuclear launch codes, because there's at least a
POSSIBILITY of survival in the latter case.

And if e-voting is outside the domain of this list, then I can't imagine who
WOULD have a handle on it.

Wrt to part's I snipped, also agree that Scott's post was excellent, and I
need to read it again.  (Btw, I thought the OSI model had 7 layers, but
icbw.)


| -----Original Message-----
| [mailto:midrange-l-bounces@xxxxxxxxxxxx]On Behalf Of James Rich
| Sent: Friday, March 19, 2004 6:15 PM

| On Fri, 19 Mar 2004, jt wrote:
|
| > What I have never understood is whether Kerberos, SSH, SSL,
| TLS, VPN and/or
| > IPV6 if it has any security stuff.. Whether ANY of these (and
| I'm sure I'm
| > missing a few) run the exact same encryption methods or not??
| If not, SEEMS
| > like would be an advantage to the added overhead as it would
| appear to be
| > harder to crack both at the same time, but dunno if that's the
| case at all.
|
| They can use the same encryption, or they can use different encryption
| schemes.  Many, if not most, allow you to choose an encryption scheme.
|
| If there are multiple layers of encryption it is impossible to crack or
| decrypt them simultaneously.  Each layer must be completed before starting
| on the next (per packet).  While it is true that additional layers would
| make things harder to crack, this advantage is far outweighed by the
| disadvantages of complexity and overhead.  A single layer of proper
| encryption already provides enough protection for almost everything.
| Unless you're sending out nuclear launch codes.  In which case don't use
| the internet...
|
| > Afaik, none of these are sufficient to store and forward legal
| votes, btw.
|
| I don't think the encryption protocols is the root of the problems of
| e-voting.  More likely the moronic and breath-takingly stupid
| implementation of the systems as a whole.  But this is completety OT
| (sorry list and David).

<hated to snip>



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.