Thanks for the comments.

I used the phrase 'a crypto API' as a generic reference, CryptoAPI would
have been a direct reference to a proprietary product. But, yes,
cryptoki is what I meant.

Regarding symmetric keys: in SSL, symmetric keys are generated anew per
session (leaving aside reconnection) so it doesn't seem appropriate to
store them in hardware. Therefore, I wouldn't be surprised if OpenSSL
expects them to be visible - I don't see this as a BAD thing.

> -----Original Message-----
> From: Dr Stephen Henson [SMTP:[EMAIL PROTECTED]]
> Sent: Tuesday, August 17, 1999 4:11 AM
> To:   [EMAIL PROTECTED]
> Subject:      Re: Revised OpenSSL hardware support
> 
> Ron Ramsay wrote:
> > 
> > Having a crypto API (pkcs11?) within the product would be very
> welcome.
> > 
> 
> I think you mean cryptoki. Crypto API is an MS thingy which we
> probably
> don't want...
> 
> > Personally, I think only asymmetric private key operations should be
> > performed in hardware and symmetric key operation would be performed
> as
> > they are now. This is because some applications would use smart
> cards
> > which normally are CPU impaired. If the hardware 'accelerates'
> symmetric
> > key operations then perhaps this could be enabled at compile time or
> run
> > time.
> > 
> 
> There are some cases where hardware symmetric key handling would be
> useful. Some crypto hardware include symmetric encryption acceleration
> and symmetric key protection. For example you could decrypt a block
> using a hardware private key and obtain a symmetric key and decrypt
> some
> data with it. Under PKCS#11 it can make sure the symmetric key is
> never
> revealed outside the library (or hardware). This is generally more
> secure than having the key visible in memory.
> 
> Curently symmetric key protection is a bit problematical because the
> EVP
> interface largely assumes the key is "visible" and it can do horrible
> things to it like change the IV or clone the context. 
> 
> Steve.
> -- 
> Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
> Personal Email: [EMAIL PROTECTED] 
> Senior crypto engineer, Celo Communications: http://www.celocom.com/
> Core developer of the   OpenSSL project: http://www.openssl.org/
> Business Email: [EMAIL PROTECTED] PGP key: via homepage.
> 
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to