On Mon, 9 Jul 2012 16:49:15 -0400, Rob Schramm wrote: >... because security through obscurity always works. <wink>
lol - I think this discussion just about lost interest for me when Greg posted thus: <quote> Since a protected key begins life as a secure key, the operational key must first be decrypted from under the master key (inside the CEX3) but then it is wrapped using the wrapping key. </quote> Shane ... (assiduously eschew obfuscation). ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN