Re: actual deployment of various PK Key-exchange algorthms?

2000-08-02 Thread Bill Frantz
At 9:14 AM -0700 7/27/00, [EMAIL PROTECTED] wrote: A colleague asked yesterday "I wonder how much Diffie-Hellman is actually used?", as we were sitting around talking about authentication (in particular) and security (in general) protocols. So I'm curious, are there any studies on what is

Re: names to say in late september

2000-08-02 Thread Arnold G. Reinhold
From http://www.yahoo.com 8/2/2000 1pm WASHINGTON (Reuters) - A federal judge ordered an emergency hearing on Wednesday on a privacy rights group's request for the immediate release of details on Carnivore, the Federal Bureau of Investigation's e-mail surveillance tool. The Electronic

RC4 vs RC5

2000-08-02 Thread Chris Duffy
I was searching around and chanced upon your list. I am trying to compare RC4 vs RC5 encryption. Can someone fill me in on the advantages/disadvantages of these two? Thanks, Chris Senior Systems Engineer Citrix Systems

Re: RC4 vs RC5

2000-08-02 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Chris Duffy writes: I was searching around and chanced upon your list. I am trying to compare RC4 vs RC5 encryption. Can someone fill me in on the advantages/disadvantages of these two? Thanks, They're not related. RC4 is a stream cipher. It's very fast per