In <v04220810b4d07e3edb5b@[10.0.1.2]>, on 02/16/00 
   at 10:18 AM, "R. A. Hettinga" <[EMAIL PROTECTED]> said:


>--- begin forwarded text


>Date: Tue, 15 Feb 2000 19:04:15 -0500
>From: <Somebody>
>To: [EMAIL PROTECTED]
>Subject: www.digicash.com

>"fascinating"

>--- end forwarded text

from http://www.digicash.com/Company/


"eCash software uses digital signature technology based on
public key cryptography, to provide authentication,
non-repudiation, data integrity, and confidentiality. For the maximum
security available, eCash uses 768-bit RSA keys
with 3-DES. eCash is a very efficient protocol, which
enables key lengths to increase over time without unduly
impacting performance. eCash uses Secure Hash Algorithm
(SHA-1) for its cryptographic hash function. eCash owns
and uses a patented blind signature encoding algorithm that
allows banks to issue eCash, which can be sent from
consumer to merchant in complete privacy. As financial
institutions develop interoperable certificate authorities for issuing
digital certificates, eCash will apply standard bank digital certificates
to eCash payment protocols."


Website is still in the construction phase and only limited info there.
The 768-bit RSA keys seem a little small and I am not all that sure that
3-DES is the best choice of symetric algorithms for this application.

It is good to see that someone is putting the patents to use rahter than
let them collect dust on a shelf until they expire (anyone know when that
is?) 

-- 
---------------------------------------------------------------
William H. Geiger III                    http://www.openpgp.net  
Geiger Consulting    

Data Security & Cryptology Consulting
Programming, Networking, Analysis
 
PGP for OS/2:                   http://www.openpgp.net/pgp.html
---------------------------------------------------------------

Fight Censorship! Stop the MPAA! http://www.openpgp.net/censorship.html

-----BEGIN PGP MESSAGE, PART 20/36-----
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=KMXF
-----END PGP MESSAGE, PART 20/36-----



Reply via email to