Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread NdK
Il 05/09/2012 13:29, helpcrypto helpcrypto ha scritto: > The most advanced i have seen here so far is 2048 :P I bought (but haven't yet had time to experiment with) Cryptomate64: http://www.acs.com.hk/index.php?pid=product&prod_sections=0&id=CRYPTOMATE64 See my message dated 2012/05/23. Doesn't

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread helpcrypto helpcrypto
> Do you want my Humble or Honest opinion ? :) None. Hacker one :P > It shall depend on the use case. I doubt that there will ever be a > "single, universal keychain", but many. VPN authentication with device > based (TMP etc) keys which get auto-provisioned and a "movable" > identity in the form

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread Martin Paljak
On Wed, Sep 5, 2012 at 2:29 PM, helpcrypto helpcrypto wrote: >> And IMHO device-attached containers (TPM, Intel etc) are totally >> different from transportable key-containers (like smart cards or USB >> tokens) > > So, IYHO, whats the better option? Do you want my Humble or Honest opinion ? :)

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread Anders Rundgren
On 2012-09-05 13:29, helpcrypto helpcrypto wrote: >> Huh, I'd guess (hope) nobody would be deploying *RSA* below 2048 bits >> (smart cards doing 3k and 4k are also slowly emerging) and elliptic >> curves are already becoming a viable option (in commodity software) as >> well.. > > The most advance

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread J.Witvliet
Credential Cloning. Was: Intel's Virtual Smart Card > Huh, I'd guess (hope) nobody would be deploying *RSA* below 2048 bits > (smart cards doing 3k and 4k are also slowly emerging) and elliptic > curves are already becoming a viable option (in commodity software) as > well.. Th

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread helpcrypto helpcrypto
> Huh, I'd guess (hope) nobody would be deploying *RSA* below 2048 bits > (smart cards doing 3k and 4k are also slowly emerging) and elliptic > curves are already becoming a viable option (in commodity software) as > well.. The most advanced i have seen here so far is 2048 :P > There's also a bun

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread Martin Paljak
On Wed, Sep 5, 2012 at 12:57 PM, helpcrypto helpcrypto wrote: > Also, considering how governments are involved in technology, probably > many countries will adopt them, like eID, DNIe, and so in the next > years. > In 1024bit mode, of course. Huh, I'd guess (hope) nobody would be deploying *RSA*

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread helpcrypto helpcrypto
Just to sum up: -TPM (fail?) -Intel IPT (seem to be a draft and only for intel?) -SC (Welcome 1970) -Virtual/Cloud wallets (obscure?) -A mobile device to replace sc (standard?) IMHO, SC are old enough/well known to continue existing for quite long, until someone brings a new/better/big idea. Also

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-08-20 Thread Peter Stuge
Martin Paljak wrote: > IIRC it was apple who wants to make a phone self-register. Meaning > there are no parts to add or remove from the phone and you pair it to > your operator "online". The question IMHO is how much do telcos want > to give up the "freedom" of controlling access to their networks

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-08-20 Thread Martin Paljak
On Sun, Aug 19, 2012 at 8:15 PM, Anders Rundgren wrote: > Who would buy a $100 solution if they can get one for free? > I don't think even the SIM will survive. IIRC it was apple who wants to make a phone self-register. Meaning there are no parts to add or remove from the phone and you pair it t

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-08-19 Thread Anders Rundgren
On 2012-08-19 18:55, NdK wrote: > Il 19/08/2012 15:50, Anders Rundgren ha scritto: > >> Everything you write is fine and probably correct as well. >> The only "fly in the soup" is that *it is not happening*. > I think it will be just like the TPM: when enough people will realize > what it is, it w

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-08-19 Thread NdK
Il 19/08/2012 15:50, Anders Rundgren ha scritto: > Everything you write is fine and probably correct as well. > The only "fly in the soup" is that *it is not happening*. I think it will be just like the TPM: when enough people will realize what it is, it won't get accepted by the public. It's not

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-08-19 Thread Anders Rundgren
Diego, Everything you write is fine and probably correct as well. The only "fly in the soup" is that *it is not happening*. The smart card community has failed creating a cheap a readily available token that can be provisioned on-line while for example iPhone and Android already ships with built-

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-08-19 Thread NdK
Il 19/08/2012 10:14, Anders Rundgren ha scritto: > Virtual smart cards have unlimited capacity and doesn't occupy space in > your pocket either. Then an USB token paired with some form of "unsecure" storage and have RSA capabilities and a button or a small keypad (display w/ touchscreen?) to enter

[opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-08-19 Thread Anders Rundgren
On 2012-08-17 22:32, Jean-Michel Pouré - GOOZE wrote: >> It also means that the "card" middleware will be a part of the OS. > > This will boost the smartcard technology to a wider public, which are > good news. It is essential to have the smartcard or token in the hand / > in the pocket. You compu