Many companies trade mark their company name. I've heard the term 'rsa'
pre-dates
the company, so I assume they didn't do that. I don't see it on
the web site.
However, given the, ah, acrimonious nature of this corner of this
marketplace,
it seems prudent to consider another name.
[EMAIL PROT
I tried contacting Ascom about licensing IDEA. I've got no
response. Any licensees out there would be willing to
tell me who they're talking to?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
this is talking about parallizing processing of an individual message.
the application for this is packet processing in a protocol stack,
or "lower", packet processing in hardware below+/inside the protocol
stack.
you can't parallelize IPsec, for ex
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
(If you ask me, veering off into unsolicited advertisements for
unrelated ANSI standards isn't actually on-topic, but there are
other posts so I'll assume Perry will let this through...
I'm making historical comments so this is grist for the original
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Gee, is Tatu going to yell at them too?
(Refer to
http://slashdot.org/articles/01/02/14/1120247.shtml
if you don't know what I'm talking about.)
One would think that after several years of IETF work on standardizing
(that which is called SecSH i
rk security,
e-commerce, and anything else we can convince him to talk about.
PKCS #11 application development: Project 'Minow' -- Rodney Thayer
Rodney will talk about his recent adventures in the world of PKCS #11
tokens. He's been developing a set of tool
Is there a "standard" for Triple DES, in 2-key or 3-key mode?
I don't see it in the FIPS documents, and all the IPsec RFC's
reference the 1979 Tucman article, other than that everyone seems
to point at Schneier or some other book.
Is there an official (in any sense) "standard" for it?
What I heard (from a CheckPoint developer, who had access to the
source code) was that FWZ-1 was a home-grown algorithm and used
a key length somewhere around 64 bits (can't remember exactly.)
I tried to get a publically discussable copy of the algorithm at
the time and failed. It was my impressi
At 09:46 AM 2/9/99 -0500, Arnold G. Reinhold wrote:
>Nelson Minar's comments (reproduced below) are right on target. Here are
[...] practical suggestions [...]
>2. PGP should burn computer time hashing the passphrase. While you cannot
>increase the entropy of a passphrase with an algorithm, you c
I fail to see why, in the abstract, IPsec and/or TLS (SSL's replacement)
are not solutions. If you are making a "they aren't ready for
prime time" comment, that's something else. If you are claiming
above-link-level encryption is not acceptable, then we have a valid
debate here (and Perry will s
And you are doing this because you have an intense urge to
not use IPsec or some other predefined scheme...?
(If you think they don't work, that's a great answer,
and could you please elaborate...)
At 03:21 PM 7/26/99 -0400, Andy wrote:
>Greetings,
>
>I am designing a custom client-server databa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Gilmore etc. have made comments, includingt the quoted passage below
from the Linux IPsec list, indiciating that DSA is "not as trustworthy
as RSA".
Can anyone here offer some more details?
I _know_ it's a 'fuzzy' discomfort, I'm just looking for ba
Suppose I have something complicated, like a bunch of database
files or a report from an outsourced monitoring service, that I want
to email to someone. Then I might want a self-extracting, secure
'blob'.
I think this is secure:
- pre-distribute a public key (cert, whatever) that you trust
The old timers who used to get crypto products patented
back in the dark ages tell us there were always patent
examiners 'who were funded by multiple agencies', meaning
the NSA. There is folklore about how certain features
were 'suggested to be removed', etc.
In other words, I think I'd not assu
What shall we call
that-public-key-algorithm-that-will-not-be-patent-protected in late
September? we should not use a trademarked or copyrighted term, in my
opinion.
There was discussion of this a while ago, I think. I don't recall what
was around.
I suggest "Rivest Public Key", or 'RPKey'. It
15 matches
Mail list logo