[9574] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Best practices/HOWTO for key storage in small office/home office

daemon@ATHENA.MIT.EDU (Ian Farquhar - Network Security Gr)
Thu Oct 4 00:45:32 2001

Message-ID: <3BBBB0BD.7178A2B6@sun.com>
Date: Thu, 04 Oct 2001 10:43:41 +1000
From: Ian Farquhar - Network Security Group <ian.farquhar@sun.com>
MIME-Version: 1.0
To: Rick Smith at Secure Computing <rick_smith@securecomputing.com>
Cc: Bill Stewart <bill.stewart@pobox.com>,
	Conspiracy <cryptography@wasabisystems.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Rick Smith at Secure Computing wrote:
> At 11:41 AM 10/2/2001, Bill Stewart wrote:
> >Sounds like you're starting to reinvent the I-Button.
> >(Dallas semiconductor's product - uses a small computer chip
> >and an infrared link attached to a watch battery.)
 
> Or the iKey which is pretty much exactly what you're describing -- smart
> card-like crypto functions and key storage that plugs right into a USB
> socket.

Not quite.  The iKey is tamper evident (evaled to FIPS 140-1 Level 2 -
cert
#161), whereas the  JavaButton is tamper respondent (FIPS 140-1 Level 3
-
cert #111).  I'd much prefer a tamper respondent keystore.

Ian.

PS. Personal opinions, not my employer's.



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post