[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: What price security?
Andrade Software & Networking
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text/plain; charset=US-ASCII
Robert Moskowitz wrote:
> At 09:23 AM 6/20/97 -0700, Phil Karn wrote:
> >>Nonetheless, there are applications (such as gigabit routers) where the
> >>processor-to-bandwidth ratio is smaller than pentium-over-modem.
> >Which, IMHO, is yet another compelling argument for doing encryption
> >on an end-to-end basis whenever possible.
> And those servers better gear up for some hefty crypto work!
Take a look at the May/June IEEE Network magazine. The 1st article
by Roger Needham, "The Changing Environment for Security Protocols",
is quite thought provoking. I think these technological and
organizational trends he discusses will be incorporated into the
future design of cryptographic protocols.
P.O. Box 11406
Pleasanton, CA 94588
(510) 417-0159 Fax/Voice