James A. Donald:
> > Assume Ann's secret key is a, and her public key is A
> > = G^a mod P
> >
> > Assume Bob's secret key is b, and his public key is B
> > = G^b mod P
> >
> > Bob wants to send Ann a message.
> >
> > Bob generates a secret random number x, and sends Ann
> > X = G^x mod P
> >
> >
On Tue, May 15, 2007 at 11:37:56AM +0200, Ian G wrote:
> Nicolas Williams wrote:
> >The requirement for having providers signed by a vendor's key certified
> >by Sun was to make sure that only providers from suppliers not from,
> >say, North Korea etc., can be loaded by the pluggable frameworks.
>
Nicolas Williams wrote:
On Mon, May 14, 2007 at 11:06:47AM -0600, [EMAIL PROTECTED] wrote:
Ian G wrote:
* Being dependent on PKI style certificates for signing,
...
The most important motivation at the time was to avoid the risk of Java being
export-controlled as crypto. The theory within S
On Mon, May 14, 2007 at 11:06:47AM -0600, [EMAIL PROTECTED] wrote:
> Ian G wrote:
> > * Being dependent on PKI style certificates for signing,
> ...
>
> The most important motivation at the time was to avoid the risk of Java being
> export-controlled as crypto. The theory within Sun was that "c