[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: weak devices



Phil Karn says:
> >Phil, how well are these devices equipped to do modular exponentiations
> >as required for the mechanisms we discuss?
>
> Not very well, I'm afraid. But if you want the ultimate in security,
> you want to use a trusted machine even if it's slower than something
> else.

OK, then why were we discussing how fast or slow MD5 is on those
trusted but underpowered machines?
--
Regards,
Uri         uri@watson.ibm.com      N2RIU
-----------
<Disclamer>



Follow-Ups: References: