Re: patent of the day

2008-01-23 Thread Todd Arnold
Our IBM cryptographic processors (HSMs) have been using this technique 
since around 1996 - data that is stored in flash memory is encrypted with 
a key that is destroyed on any attempt to tamper with the security module.

---
Todd W. Arnold, STSM
IBM Cryptographic Technology Development
(704) 594-8253   FAX 594-8336
---
email:  [EMAIL PROTECTED]



"Perry E. Metzger" <[EMAIL PROTECTED]> 
Sent by: [EMAIL PROTECTED]
01/22/2008 10:29 PM

To
cryptography@metzdowd.com
cc

Subject
patent of the day







http://www.google.com/patents?vid=USPAT6993661

Hat tip to a party who prefers to remain anonymous who sent me the
patent number.

-- 
Perry E. Metzger [EMAIL PROTECTED]
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: World's most powerful supercomputer goes online

2007-09-01 Thread Todd Arnold
That's quite an interesting thing to ponder, but don't forget that only 
some supercomputer applications (like crypto!) can be handled well by this 
sort of highly distributed system.  There is more to most "real 
supercomputers" than just MHz times number of CPUs - there is also very 
high-speed data communications and sharing between those multiple CPUs. 
The botnet does not have that, so it is limited to working on problems 
that can be completely divided into independent pieces of work where there 
is little or no need to pass data between the CPUs.  If you're trying to 
do an exhaustive key search, however, it looks like a pretty attractive 
thing to use.

-------
Todd Arnold
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]