[15929] in cryptography@c2.net mail archive
Re: RPOW - Reusable Proofs of Work
daemon@ATHENA.MIT.EDU (Anne & Lynn Wheeler)
Mon Aug 16 18:58:13 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 16 Aug 2004 16:31:58 -0600
To: "R. A. Hettinga" <rah@shipwright.com>
From: Anne & Lynn Wheeler <lynn@garlic.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <p061104afbd455bf3fcf9@[66.149.49.5]>
At 12:36 PM 8/15/2004, R. A. Hettinga wrote:
>The new concept in the server is the security model. The RPOW server
>is running on a high-security processor card, the IBM 4758 Secure
>Cryptographic Coprocessor, validated to FIPS-140 level 4. This card
>has the capability to deliver a signed attestation of the software
>configuration on the board, which any (sufficiently motivated) user
>can verify against the published source code of the system. This lets
>everyone see that the system has no back doors and will only create RPOW
>tokens when supplied with POW/RPOW tokens of equal value.
I got hit with exploits on 4758 cards ... in thread in sci.crypt
http://www.garlic.com/~lynn/2004j.html#2
--
Anne & Lynn Wheeler http://www.garlic.com/~lynn/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com