What shall we call
that-public-key-algorithm-that-will-not-be-patent-protected in late
September? we should not use a trademarked or copyrighted term, in my
opinion.
There was discussion of this a while ago, I think. I don't recall what
was around.
I suggest "Rivest Public Key", or 'RPKey'.
On Thu, Jul 27, 2000 at 07:05:38AM -0700, Rodney Thayer wrote:
What shall we call
that-public-key-algorithm-that-will-not-be-patent-protected in late
September? we should not use a trademarked or copyrighted term, in my
opinion.
There was discussion of this a while ago, I think. I don't
A colleague asked yesterday "I wonder how much Diffie-Hellman is actually
used?", as we were sitting around talking about authentication (in particular)
and security (in general) protocols.
So I'm curious, are there any studies on what is actually deployed "out there"
and/or available in
Rodney Thayer wrote:
What shall we call
that-public-key-algorithm-that-will-not-be-patent-protected in late
September? we should not use a trademarked or copyrighted term, in my
opinion.
"The Public Key Algorithm Formerly Known as RSA"
In the usual academic tradition, it should continue
At 07:05 AM 7/27/00 -0700, Rodney Thayer wrote:
...
I suggest "Rivest Public Key", or 'RPKey'. It's not the prettiest
buzzword I've ever
suggested, but is there something better to call it?
There's already an RPK, which (if I recall correctly) is based on doing
Diffie-Hellman with shift
At 7:05 AM -0700 7/27/2000, Rodney Thayer wrote:
What shall we call
that-public-key-algorithm-that-will-not-be-patent-protected in late
September? we should not use a trademarked or copyrighted term, in my
opinion.
There was discussion of this a while ago, I think. I don't recall what
was
How about RISHAD?
It's pronounceable, captures all three inventors in the same order
and equal proportions, and is already a name, with relevant connotations.
The similar "Rashad" is listed as meaning "integrity of conduct", which seems
particularly appropriate.
Eric Murray wrote:
On Thu, Jul 27, 2000 at 07:05:38AM -0700, Rodney Thayer wrote:
What shall we call
that-public-key-algorithm-that-will-not-be-patent-protected in late
September? we should not use a trademarked or copyrighted term, in my
opinion.
There was discussion of this a
hi
can someone point me to a tool (preferably unix command line) for
conversion between different X.509 certificate encodings, DER, base64,
thanks
sanket
What are you really trying to do? X.509 is ASN.1 encoded by
definition and that is important because it's that encoding that is
signed. I can understand wanting to part a certificate and extract
fields, but why would you generally want to convert it to a different
encoding? For anyone to
Many companies trade mark their company name. I've heard the term 'rsa'
pre-dates
the company, so I assume they didn't do that. I don't see it on
the web site.
However, given the, ah, acrimonious nature of this corner of this
marketplace,
it seems prudent to consider another name.
[EMAIL
There is the "x509" tool which is part of SSLeay (or OpenSSL).
-Jeff
Sanket Naik wrote:
hi
can someone point me to a tool (preferably unix command line) for
conversion between different X.509 certificate encodings, DER, base64,
thanks
sanket
On Wed, 26 Jul 2000, Eugene Leitl wrote:
Clearly, you can maintain a secure connection to an anonymous party.
No you cannot. If Bob is anonymous then it is impossible for Alice to
know if her secure connection goes to Bob or Mitch. In the classic
man-in-the-middle attack Mitch impersonates
--
James A. Donald writes:
In real life situations where one wishes a conversation to be
secure, people are most commonly authenticated by not by true
name, but by face.
At 02:49 PM 7/26/2000 -0700, Eugene Leitl wrote:
We're mixing several unrelated items in one pot here. One
14 matches
Mail list logo