Discussion about the Public Key Protection Scheme

Implemented in this way, Access Authorization does not violate agaist the implementation guideline requiring that there are no sessions between client and server.

The Public Key Scheme in itself is independent of the encryption methods selected. The only requirements are that one is a public key cryptosystem, and the other one is a single key cryptosystem, and that server and client agree on the cryptosystems used. See the discussion about possible encryption methods.

AL 12 December 1993