[15929] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: RPOW - Reusable Proofs of Work

daemon@ATHENA.MIT.EDU (Anne & Lynn Wheeler)
Mon Aug 16 18:58:13 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 16 Aug 2004 16:31:58 -0600
To: "R. A. Hettinga" <rah@shipwright.com>
From: Anne & Lynn Wheeler <lynn@garlic.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <p061104afbd455bf3fcf9@[66.149.49.5]>

At 12:36 PM 8/15/2004, R. A. Hettinga wrote:
>The new concept in the server is the security model.  The RPOW server
>is running on a high-security processor card, the IBM 4758 Secure
>Cryptographic Coprocessor, validated to FIPS-140 level 4.  This card
>has the capability to deliver a signed attestation of the software
>configuration on the board, which any (sufficiently motivated) user
>can verify against the published source code of the system.  This lets
>everyone see that the system has no back doors and will only create RPOW
>tokens when supplied with POW/RPOW tokens of equal value.

I got hit with exploits on 4758 cards ... in thread in sci.crypt
http://www.garlic.com/~lynn/2004j.html#2




--
Anne & Lynn Wheeler    http://www.garlic.com/~lynn/ 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post