| |
An e-mail security protocol, part 2 | page 10 of 14 |
Just what would we like to accomplish with an e-mail
security protocol? Let's list some goals:
- We would like to enable correspondents to send private
messages to us without requiring separate security procedures
for key exchange (and we would like to write back to such
correspondents with the same ease).
- We would like to allow correspondents to "sign" messages
and thereby provide a reasonable assurance about the true
origin of messages.
- As a corollary of the first goal, we would like to have
a reasonable assurance that the keys we believe to
correspond with a certain person really are associated with
that person (no spoofing of identities).
- We would like the whole protocol to make as many limited
computational demands as possible while obtaining these other
goals.
- We would like the whole application or system that
implements our protocol to be transparent and user-friendly.
The last goal falls outside the scope of this tutorial,
but it is not something to ignore when one gets to the
actual programming and design.
|