On Feb 6, 2006, at 2:56 PM, Hal Merritt wrote:
Describing the doc as 'murky' is being too kind, IMHO. I would
sometimes
use the phrase: "just plain wrong". I was fortunate in that the
business
partner and IBM set it up originally. At least I had a running
system to
study.
Key management was never an issue in our shop as we are old hands at
that. There are four people involved in our process, and each have
steps
to perform to accomplish the mission. Getting the hardware and
software
to work not being 100% sure of what I was doing was, ah, interesting.
But you touch on a very interesting point: key management is 'the'
issue
in a cryptographic solution IMHO. That is, the encryption and
decryption
is trivial in perspective.
This was in a shop that you had to get permission to sneeze and
politics were bloody awful.
I left right around that time and was greatful that I didn't have to
get involved.
Ed
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html