[22580] in cryptography@c2.net mail archive
Re: "Secure Blue" from IBM
daemon@ATHENA.MIT.EDU (Victor Duchovni)
Thu Apr 13 14:23:02 2006
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 13 Apr 2006 12:35:44 -0400
From: Victor Duchovni <Victor.Duchovni@MorganStanley.com>
To: cryptography@metzdowd.com
Mail-Followup-To: cryptography@metzdowd.com
In-Reply-To: <87zmipy0ox.fsf@snark.piermont.com>
On Thu, Apr 13, 2006 at 11:06:38AM -0400, Perry E. Metzger wrote:
> With Secure Blue, data is encrypted and decrypted as it runs through a
> processor, according to IBM. It is maintained encrypted in the device
> memory, or RAM. One of the few times data would not be scrambled is
> when it is actually displayed.
>
> http://news.com.com/2100-7355_3-6059276.html
"Easy enough" for ephemeral data (RAM, network, ...), but what do they
propose for stored data? Is this an architecture for general-purpose
computers, or for special-purpose media devices? Is more detail available?
As soon as data is stored, new key management issues come to the surface.
I for one would not want to lose my hard-drive if the CPU is fried...
--
/"\ ASCII RIBBON NOTICE: If received in error,
\ / CAMPAIGN Victor Duchovni please destroy and notify
X AGAINST IT Security, sender. Sender does not waive
/ \ HTML MAIL Morgan Stanley confidentiality or privilege,
and use is prohibited.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com