On Feb 6, 2006, at 2:56 PM, Hal Merritt wrote:

Describing the doc as 'murky' is being too kind, IMHO. I would sometimes use the phrase: "just plain wrong". I was fortunate in that the business partner and IBM set it up originally. At least I had a running system to
study.

Key management was never an issue in our shop as we are old hands at
that. There are four people involved in our process, and each have steps to perform to accomplish the mission. Getting the hardware and software
to work not being 100% sure of what I was doing was, ah, interesting.

But you touch on a very interesting point: key management is 'the' issue in a cryptographic solution IMHO. That is, the encryption and decryption
is trivial in perspective.


This was in a shop that you had to get permission to sneeze and politics were bloody awful.

I left right around that time and was greatful that I didn't have to get involved.

Ed

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to