Shane Ginnane wrote:
>lol - I think this discussion just about lost interest for me when Greg posted 
>thus:
><quote>
>Since a protected key begins life as a secure key, the operational key must 
>first be decrypted from under the master key (inside the CEX3) but then it is 
>wrapped using the wrapping key.
></quote>

Shane, just curious - why?

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to