OK, let me ask a more specific question. Actually, let me
put forth some hypotheses about how I think it works, and
see if anyone has corrections or comments.
0) I'm not sure the words Perfect Forward Secrecy convey what
we mean when we talk about PFS. Definition 12.16 in HAC suggests
On Wed, 1 Dec 2004, Anne Lynn Wheeler wrote:
the other attack is on the certification authorities business process
Note that in a fair number of Certificate issuing processes common in
industry the CA (sysadmin) generates both the private key -and-
certificate, signs it and then exports both
Eric Rescorla [EMAIL PROTECTED] writes:
John Denker [EMAIL PROTECTED] writes:
Eric Rescorla wrote:
Uh, you've just described the ephemeral DH mode that IPsec
always uses and SSL provides.
I'm mystified by the word always there, and/or perhaps by
the definition of Perfect Forward
This sounds very confused. Certs are public. How would knowing a copy
of the server cert help me to decrypt SSL traffic that I have intercepted?
I found allot of people mistakenly use the term certificate to mean
something like a pkcs12 file containing public key certificate and private
key.
R.A. Hettinga [EMAIL PROTECTED] forwarded:
Promoting implanted RFID devices as a security measure is downright 'loco,'
says Katherine Albrecht. Advertising you've got a chip in your arm that
opens important doors is an invitation to kidnapping and mutilation.
Since kidnapping is sort of an
http://www.physorg.com/news2227.html
PhysOrg
Nano and Quantum Physics Technology Applied Physics Space and Earth
science Electronic Devices Striking Research and Developments
Quantum memory for light
December 03, 2004
Realization of quantum memory for light allows the extension of quantum
Anton Stiglic wrote:
I found allot of people mistakenly use the term certificate to mean
something like a pkcs12 file containing public key certificate and private
key. Maybe if comes from crypto software sales people that oversimplify or
don't really understand the technology. I don't know, but