[22580] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: "Secure Blue" from IBM

daemon@ATHENA.MIT.EDU (Victor Duchovni)
Thu Apr 13 14:23:02 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 13 Apr 2006 12:35:44 -0400
From: Victor Duchovni <Victor.Duchovni@MorganStanley.com>
To: cryptography@metzdowd.com
Mail-Followup-To: cryptography@metzdowd.com
In-Reply-To: <87zmipy0ox.fsf@snark.piermont.com>

On Thu, Apr 13, 2006 at 11:06:38AM -0400, Perry E. Metzger wrote:

>   With Secure Blue, data is encrypted and decrypted as it runs through a
>   processor, according to IBM. It is maintained encrypted in the device
>   memory, or RAM. One of the few times data would not be scrambled is
>   when it is actually displayed. 
> 
> http://news.com.com/2100-7355_3-6059276.html

"Easy enough" for ephemeral data (RAM, network, ...), but what do they
propose for stored data? Is this an architecture for general-purpose
computers, or for special-purpose media devices? Is more detail available?

As soon as data is stored, new key management issues come to the surface.
I for one would not want to lose my hard-drive if the CPU is fried...

-- 

 /"\ ASCII RIBBON                  NOTICE: If received in error,
 \ / CAMPAIGN     Victor Duchovni  please destroy and notify
  X AGAINST       IT Security,     sender. Sender does not waive
 / \ HTML MAIL    Morgan Stanley   confidentiality or privilege,
                                   and use is prohibited.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post