Does anyone have any estimates for the project cost of employing HSMs at
a single task? (e.g., protecting / deploying a single secret, not a
network of them.)
I'm not looking for sticker prices but project costings, including:
spare devices, programming, work-throughs and transfers, documenta
On 10/04/12 02:40 AM, Marsh Ray wrote:
On 04/09/2012 07:00 AM, Jeffrey Walton wrote:
http://h-online.com/-1498071
none of the five finalists are affected by known attacks on MD5,
SHA-1 and SHA-2 and the Merkle-Damgård construction on which all
three are based.
Well, gee, isn't that enough?
> The National Institute of Standards and Technology (NIST),
> which is responsible for the process, has moved from talking of a
> successor to talking of 'augmentation'.
>
NIST hasn't moved; the 2007 call for submission reads the following:
"NIST has decided that it is prudent to develop a new ha
On 04/09/2012 07:00 AM, Jeffrey Walton wrote:
http://h-online.com/-1498071
none of the five finalists
are affected by known attacks on MD5, SHA-1 and SHA-2 and the
Merkle-Damgård construction on which all three are based.
Well, gee, isn't that enough?
True, one thing we've learned from the SH
http://h-online.com/-1498071
With a successor to Secure Hash Algorithm 2 (SHA-2) due to be crowned
in the summer, questions are being asked as to whether a new
cryptographic standard is really necessary. Hash functions, used to
calculate short numbers from large data sets to allow the authenticity