Thoughts on droplets
Tue, 02 Nov 1999 21:59:37 +0000
> > So this hypothetical hardware contains only publicly
> > available algorithms and no secret keys?
> I didn't say that. The hardware contains publicly available algorithms and
> a private key (as distinct from a secret key). No shared secrets are
> involved. The control issue that concerns you about shared secrets
> therefore does not arise.
That was the obvious answer. But how do you protect the private key from
"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
- Indira Gandhi