Regarding ... #6

William Allen Simpson <bsimpson@morningstar.com> Fri, 23 February 1996 17:41 UTC

Received: from ietf.cnri.reston.va.us by IETF.CNRI.Reston.VA.US id aa00374; 23 Feb 96 12:41 EST
Received: from CNRI.Reston.VA.US by IETF.CNRI.Reston.VA.US id aa00370; 23 Feb 96 12:41 EST
Received: from neptune.tis.com by CNRI.Reston.VA.US id aa28575; 23 Feb 96 12:41 EST
Received: from neptune.tis.com by neptune.TIS.COM id aa23762; 23 Feb 96 12:28 EST
Received: from relay.tis.com by neptune.TIS.COM id aa23748; 23 Feb 96 12:25 EST
Received: by relay.tis.com; id MAA25120; Fri, 23 Feb 1996 12:27:27 -0500
Received: from sol.tis.com(192.33.112.100) by relay.tis.com via smap (V3.1) id xma025113; Fri, 23 Feb 96 12:26:58 -0500
Received: from relay.tis.com by tis.com (4.1/SUN-5.64) id AA00821; Fri, 23 Feb 96 12:25:56 EST
Received: by relay.tis.com; id MAA25108; Fri, 23 Feb 1996 12:26:56 -0500
Received: from merit.edu(35.1.1.42) by relay.tis.com via smap (V3.1) id xma025104; Fri, 23 Feb 96 12:26:46 -0500
Received: from Bill.Simpson.DialUp.Mich.Net (pm036-11.dialip.mich.net [141.211.7.53]) by merit.edu (8.7.3/merit-2.0) with SMTP id MAA21792 for <ipsec@TIS.COM>; Fri, 23 Feb 1996 12:27:45 -0500 (EST)
Date: Fri, 23 Feb 1996 17:05:20 +0000
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: William Allen Simpson <bsimpson@morningstar.com>
Message-Id: <4937.bsimpson@morningstar.com>
To: ipsec@tis.com
Subject: Regarding ... #6
X-Orig-Sender: ipsec-request@neptune.tis.com
Precedence: bulk

A small note to cover the bases:

> From: Ran Atkinson <rja@cisco.com>
> 6) Please also see ...
>           the note from Ron Rivest with subject
>       "Photuris terminology" dated 12 Oct 1995 19:54:57
>
Which read (excerpted):

# *****************************************************************
# *** There is nothing in this notion of "signature" that means ***
# *** that the message can not be derived from the signature.   ***
# *****************************************************************
# Indeed, I believe that the CCITT standards distinguish explicitly between
# "signature schemes with message recovery" and "signature schemes without
# message recovery".
# ...
# I would suggest adding language of the following form somewhere (such as
# on the top of page 23):
#
#         The Signature-Choice method must specify a signature method that
#         does not have "message recovery": it should not be feasible to
#         compute the message from the signature.
# ...

The language appeared in draft -05 on Oct 14!  Cannot get much faster
than that!

Also, in response to other messages, the use of the term Signature was
changed to Verification, of which a "signature" is only one example....

Bill.Simpson@um.cc.umich.edu
          Key fingerprint =  2E 07 23 03 C5 62 70 D3  59 B1 4F 5E 1D C2 C1 A2