[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: weak devices
Phil Karn says:
> >Phil, how well are these devices equipped to do modular exponentiations
> >as required for the mechanisms we discuss?
>
> Not very well, I'm afraid. But if you want the ultimate in security,
> you want to use a trusted machine even if it's slower than something
> else.
OK, then why were we discussing how fast or slow MD5 is on those
trusted but underpowered machines?
--
Regards,
Uri uri@watson.ibm.com N2RIU
-----------
<Disclamer>
Follow-Ups:
References: