Crypto hardware

2001-07-10 Thread Kent Crispin

A couple of years ago at the RSA conference one of the vendors was 
exhibiting a tamperproof that would keep a secret key and perform 
encryptions/signatures using the key.  Since the key never left the 
box, in theory security reduced to physical security around the box.  
The intended use of the box was as a master for a CA.  I thought the 
vendor was GTE, but I didn't find anything definitive on their site.

Does this description trigger any recollection?  Are there similar 
devices on the market from other sources?

-- 
Kent Crispin   Be good, and you will be
[EMAIL PROTECTED]   lonesome. -- Mark Twain



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Crypographically Strong Software Distribution HOWTO

2001-07-02 Thread Kent Crispin

On Mon, Jul 02, 2001 at 04:37:00PM -0400, Rich Salz wrote:
  I've written a HOWTO on the cryptographically strong distribution
  of computer software.  Any constructive criticism would be
  appreciated.
 
 Seems pretty nice; thanks for doing this.
 
 Any chance of using SHA1 instead of MD5?  MD5 seems to have weaknesses;
 the IETF says not to use it in their protocols, for example.

Any references for either the weaknesses of md5, or what the IETF has to 
say on the issue?

-- 
Kent Crispin   Be good, and you will be
[EMAIL PROTECTED]   lonesome. -- Mark Twain



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]