On Mon, 9 Jul 2012 16:49:15 -0400, Rob Schramm wrote:

>... because security through obscurity always works. <wink>

lol - I think this discussion just about lost interest for me when Greg posted 
thus:
<quote>
Since a protected key begins life as a secure key, the operational key must 
first be decrypted from under the master key (inside the CEX3) but then it is 
wrapped using the wrapping key.
</quote>

Shane ...
(assiduously eschew obfuscation).

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to