On Mon, Feb 25, 2008 at 8:03 PM, Ken Schaefer <[EMAIL PROTECTED]> wrote:
> Read their whitepaper - the RAM contents are available for between about 5 
> and 25 seconds depending
> on the type of RAM used.

  I'm not saying attack is practical.  It seems far-fetched to me.
But your suggested counter-measure was, "don't keep the keys in RAM".
As far as I know, if you're using a host-based crypto system, where
the CPU is doing the work, the keys have to be stored in RAM.  There's
no way around it.  No?

-- Ben

~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to