[13897] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Abit's SecureIDE

daemon@ATHENA.MIT.EDU (Mads Rasmussen)
Thu Aug 21 21:46:19 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 4 Aug 2003 13:14:31 -0300
From: "Mads Rasmussen" <mads@opencs.com.br>
To: <cryptography@metzdowd.com>


There seems to be a new interesting product from Abit, a motherboard
manufacturer.=20

"SecureIDE", supposed to encrypt information between the CPU and the IDE
HD.

Have a look at
http://www.abit.com.tw/abitweb/webjsp/english/SecureIDE.htm

The idea is simple:

CPU <--> Chip <--> HD

And the concept seems to be reasonable at first eyesight, skipping the
stuff like the quote below, which gives me a snakeoil feeling.

 "A password can be cracked by software in a few hours. ABIT's SecureIDE
will keep government supercomputers busy for weeks and will keep the
RIAA away from your Kazaa files forever."=20

There is a datasheet that tells it all

ftp://ftp.abit.com.tw/pub/download/fae/secureide_eng_v100.pdf

I quote:

"40-bit DES (US Data Encryption Standard) is adequate for general users"

How can they make something, seemingly good and then blow it by using
only 40-bit DES keys? It cannot be export controls can it?

Well they did only say weeks in the first quote above :o)

Mads Rasmussen
www.opencs.com.br


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post