Crypto hardware
A couple of years ago at the RSA conference one of the vendors was exhibiting a tamperproof that would keep a secret key and perform encryptions/signatures using the key. Since the key never left the box, in theory security reduced to physical security around the box. The intended use of the box was as a master for a CA. I thought the vendor was GTE, but I didn't find anything definitive on their site. Does this description trigger any recollection? Are there similar devices on the market from other sources? -- Kent Crispin Be good, and you will be [EMAIL PROTECTED] lonesome. -- Mark Twain - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: Crypographically Strong Software Distribution HOWTO
On Mon, Jul 02, 2001 at 04:37:00PM -0400, Rich Salz wrote: I've written a HOWTO on the cryptographically strong distribution of computer software. Any constructive criticism would be appreciated. Seems pretty nice; thanks for doing this. Any chance of using SHA1 instead of MD5? MD5 seems to have weaknesses; the IETF says not to use it in their protocols, for example. Any references for either the weaknesses of md5, or what the IETF has to say on the issue? -- Kent Crispin Be good, and you will be [EMAIL PROTECTED] lonesome. -- Mark Twain - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]