[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Question....
- To: [email protected]
- Subject: Re: Question....
- From: Anonymous <[email protected]>
- Date: Mon, 3 Aug 1998 15:15:36 +0200
- Comments: This message did not originate from the Sender address above.It was remailed automatically by anonymizing remailer software.Please report problems or inappropriate use to theremailer administrator at <[email protected]>.
- Sender: [email protected]
---"Bernardo B. Terrado" <[email protected]> wrote:
>
> How does a hardware encryption device work?
>
If the Encryption is done on a device attached to your computer
instead of in software on your computer.
>
> Does it need human intervention to convert a plaintext to ciphertext
> or do we still give the instructions?
Depends on the device. But most require some effort.
>
> Correct me if I'm wrong, the key escrow is a hardware encryption
device.
>
Key Escrow is an action taken by the government to collect or gain
access to private keys. There was some controversy as to the clipper
chip which is hardware falling prey to key escrow however.
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com