[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: weak devices
From: uri@watson.ibm.com
Date: Tue, 10 Jan 1995 19:18:58 -0500 (EST)
Phil Karn says:
> >Phil, how well are these devices equipped to do modular exponentiations
> >as required for the mechanisms we discuss?
>
> Not very well, I'm afraid. But if you want the ultimate in security,
> you want to use a trusted machine even if it's slower than something
> else.
OK, then why were we discussing how fast or slow MD5 is on those
trusted but underpowered machines?
Because you only have to do the mdoular exponentiations once (or
relatively rarely), so you can afford to wait for it to complete?
- Ted
References: