names to say in late september

2000-07-27 Thread Rodney Thayer
What shall we call that-public-key-algorithm-that-will-not-be-patent-protected in late September? we should not use a trademarked or copyrighted term, in my opinion. There was discussion of this a while ago, I think. I don't recall what was around. I suggest "Rivest Public Key", or 'RPKey'.

Re: names to say in late september

2000-07-27 Thread Eric Murray
On Thu, Jul 27, 2000 at 07:05:38AM -0700, Rodney Thayer wrote: What shall we call that-public-key-algorithm-that-will-not-be-patent-protected in late September? we should not use a trademarked or copyrighted term, in my opinion. There was discussion of this a while ago, I think. I don't

actual deployment of various PK Key-exchange algorthms?

2000-07-27 Thread Jeff . Hodges
A colleague asked yesterday "I wonder how much Diffie-Hellman is actually used?", as we were sitting around talking about authentication (in particular) and security (in general) protocols. So I'm curious, are there any studies on what is actually deployed "out there" and/or available in

Re: names to say in late september

2000-07-27 Thread William Allen Simpson
Rodney Thayer wrote: What shall we call that-public-key-algorithm-that-will-not-be-patent-protected in late September? we should not use a trademarked or copyrighted term, in my opinion. "The Public Key Algorithm Formerly Known as RSA" In the usual academic tradition, it should continue

Re: names to say in late september

2000-07-27 Thread John Kelsey
At 07:05 AM 7/27/00 -0700, Rodney Thayer wrote: ... I suggest "Rivest Public Key", or 'RPKey'. It's not the prettiest buzzword I've ever suggested, but is there something better to call it? There's already an RPK, which (if I recall correctly) is based on doing Diffie-Hellman with shift

Re: names to say in late september

2000-07-27 Thread Arnold G. Reinhold
At 7:05 AM -0700 7/27/2000, Rodney Thayer wrote: What shall we call that-public-key-algorithm-that-will-not-be-patent-protected in late September? we should not use a trademarked or copyrighted term, in my opinion. There was discussion of this a while ago, I think. I don't recall what was

Re: names to say in late september

2000-07-27 Thread David Jablon
How about RISHAD? It's pronounceable, captures all three inventors in the same order and equal proportions, and is already a name, with relevant connotations. The similar "Rashad" is listed as meaning "integrity of conduct", which seems particularly appropriate.

Re: names to say in late september

2000-07-27 Thread Ben Laurie
Eric Murray wrote: On Thu, Jul 27, 2000 at 07:05:38AM -0700, Rodney Thayer wrote: What shall we call that-public-key-algorithm-that-will-not-be-patent-protected in late September? we should not use a trademarked or copyrighted term, in my opinion. There was discussion of this a

tool for conversion between certificate encoding

2000-07-27 Thread Sanket Naik
hi can someone point me to a tool (preferably unix command line) for conversion between different X.509 certificate encodings, DER, base64, thanks sanket

Re: tool for conversion between certificate encoding

2000-07-27 Thread Donald E. Eastlake 3rd
What are you really trying to do? X.509 is ASN.1 encoded by definition and that is important because it's that encoding that is signed. I can understand wanting to part a certificate and extract fields, but why would you generally want to convert it to a different encoding? For anyone to

Re: names to say in late september

2000-07-27 Thread Rodney Thayer
Many companies trade mark their company name. I've heard the term 'rsa' pre-dates the company, so I assume they didn't do that. I don't see it on the web site. However, given the, ah, acrimonious nature of this corner of this marketplace, it seems prudent to consider another name. [EMAIL

Re: tool for conversion between certificate encoding

2000-07-27 Thread Jeffrey I. Schiller
There is the "x509" tool which is part of SSLeay (or OpenSSL). -Jeff Sanket Naik wrote: hi can someone point me to a tool (preferably unix command line) for conversion between different X.509 certificate encodings, DER, base64, thanks sanket

Re: A proposal for secure videoconferencing and video messaging over the Internet

2000-07-27 Thread amanda
On Wed, 26 Jul 2000, Eugene Leitl wrote: Clearly, you can maintain a secure connection to an anonymous party. No you cannot. If Bob is anonymous then it is impossible for Alice to know if her secure connection goes to Bob or Mitch. In the classic man-in-the-middle attack Mitch impersonates

Re: A proposal for secure videoconferencing and video messaging over the Internet

2000-07-27 Thread James A. Donald
-- James A. Donald writes: In real life situations where one wishes a conversation to be secure, people are most commonly authenticated by not by true name, but by face. At 02:49 PM 7/26/2000 -0700, Eugene Leitl wrote: We're mixing several unrelated items in one pot here. One