[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: What price security?

Andrade Software & Networking
X-Mailer: ELM [version 2.4 PL23]
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Content-Length: 829       

Robert Moskowitz wrote:
> At 09:23 AM 6/20/97 -0700, Phil Karn wrote:
> >>Nonetheless, there are applications (such as gigabit routers) where the
> >>processor-to-bandwidth ratio is smaller than pentium-over-modem.
> >
> >Which, IMHO, is yet another compelling argument for doing encryption
> >on an end-to-end basis whenever possible.
> And those servers better gear up for some hefty crypto work!

Take a look at the May/June IEEE Network magazine.  The 1st article
by Roger Needham, "The Changing Environment for Security Protocols",
is quite thought provoking.  I think these technological and
organizational trends he discusses will be incorporated into the 
future design of cryptographic protocols.

- Alex


Alex Alten
P.O. Box 11406
Pleasanton, CA  94588

(510) 417-0159   Fax/Voice