ash based key authentication" on the left hand side of the spec. Dunno whether
I like that. There should be a means to cache credentials after an initial
trust relationship between communicating parties has been established. But from
what I understand, this type of scheme is exactly what the
; regardless of user setting.
Cheers,
Ralf
[1] How to modify your PR440FXs BIOS images for netbooting
http://www.beowulf.org/software/PR440FXNetboot.html
--
Ralf-P. Weinmann <[EMAIL PROTECTED]>
they have something that works on a *MUCH* wider range
of hardware than just two types of mobos/machines.
Thanks for the demonstration though. Does this agency seriously think we
believe they might be using the above mentioned code in a "production
environment" some day? Tsk tsk tsk...
rrig, Practical Techniques for Searches on
Encrypted Data, in Proc. of the 2000 IEEE symposium on Security and Privacy
(S&P 2000).
--
Ralf-P. Weinmann <[EMAIL PROTECTED]>
keep the RIAA away from your Kazaa files."
>
> No, I have no idea what this actually means either.
> I'm trying to find out.
>
> Peter Trei
40-bit DES in ECB mode sounds even more great. It's them
Enovatech guys again.
See here:
http://a
/ftp.abit.com.tw/pub/download/fae/secureide_eng_v100.pdf
Looks like that sucker only does key-truncated version of DES called DES-40.
Right... did they say weeks? I'd say minutes, unless ABIT means [insert some
impoverished 3rd world country] government supercomputers.
It's snakeoil, move on, nothing to see here.
Cheers,
Ralf
--
Ralf-P. Weinmann <[EMAIL PROTECTED]>
PGP fingerprint: 2048/46C772078ACB58DEF6EBF8030CBF1724