[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: weak devices



   From: uri@watson.ibm.com
   Date: Tue, 10 Jan 1995 19:18:58 -0500 (EST)

   Phil Karn says:
   > >Phil, how well are these devices equipped to do modular exponentiations
   > >as required for the mechanisms we discuss?
   >
   > Not very well, I'm afraid. But if you want the ultimate in security,
   > you want to use a trusted machine even if it's slower than something
   > else.

   OK, then why were we discussing how fast or slow MD5 is on those
   trusted but underpowered machines?

Because you only have to do the mdoular exponentiations once (or
relatively rarely), so you can afford to wait for it to complete?

						- Ted


References: