SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : CYBERIAN UNIVERSITY

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: ztect who wrote (12)6/10/1999 10:35:00 AM
From: ztect  Read Replies (1) of 46
 
Encryption Basics 101 from the zArchives

First Some Questions.....for cain from able

Message 4326654

Will JAWS L5 4096 ultimately replace SSL 3.0 (security socket layer), RSA, and J/SSl java encryption technologies as a standard for electronic commerce on the Internet because of JAW's bit capacity ensuring greater security?

Does L5 4096 intend to have consumer applications?

Will the tiered or supplemental key system be easy
enough to use for Internet commerce?

Or is L5 4096 primarily intended to secure information
and information transfer for businesses?

How does L5 4096 compare to other encryption schemes
i.e. algorithms also currently be developed like VME by meganet?
(see meganet.com) It has more bits, but is it better?

meganet.com

Does JAWZ have any of their products patented?
Or in the process of being patented?
(This is a very important question to me)

Has JAWZ secured any contracts yet for their products from security sensitive clients like the military or any governments?

The ''L5'' routine uses the keys as a portion of the formulae to decrypt, making it mathematically impossible to break given a large enough key. The data is shifted and additionally encrypted with a random number generated at the time of encryption, used to determine password authorization upon decryption. Any combination of encryption/authorization keys may be used, i.e.: Master key, Dual Key, Recipient Confirmation Key, Date Key, Location /Status Key?
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext