[2966] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: IETF building GAK into the PKI

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Jul 14 18:37:20 1998

To: Adam Back <aba@dcs.ex.ac.uk>
cc: smb@research.att.com, cryptography@c2.net
In-reply-to: Your message of "Tue, 14 Jul 1998 23:03:50 BST."
             <199807142203.XAA05078@server.eternity.org> 
Reply-To: perry@piermont.com
Date: Tue, 14 Jul 1998 18:34:26 -0400
From: "Perry E. Metzger" <perry@piermont.com>


Adam Back writes:
> With such a user requirement I would presume that the model is that
> users are not permitted to modify or install additional software on
> trading machines.

In general, they don't.

> With this threat model one alternative is to
> archive the data as it is decrypted, and before it is encrypted.
> 
> Another method might be to have an encryption/decryption server which
> decrypted all traffic as it arrived at the company.  Adds some risks,
> but if you really want access to all the incoming and outgoing data,
> this is what it ammounts to.
> 
> Would be interested in Perrys comments on how this is done in
> practice.

In practice? Surely you jest. As it stands, most email traffic is not
encrypted, and most customers do not have encryption available. People 
are gearing up for this -- it is not currently a major way of doing
business.

The clients I have that have already done some work on the subject are 
simply recording all the email going in and out and ignoring the
encryption question for now.

Perry

home help back first fref pref prev next nref lref last post