SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Gorilla and King Portfolio Candidates -- Ignore unavailable to you. Want to Upgrade?


To: Eric L who wrote (15237)1/16/2000 9:03:00 PM
From: Eric L  Respond to of 54805
 
Project Hunt: RSA Security Inc. (RSAS) - Post (2)
Keywords: Network Security, Data Security, PKI & PKCS, eSecurity
Subject: RSA Conference 2000

<< VOLUNTEER REQUESTED! >>

I am still looking for someone with a copy of the FM with perhaps an hour to spare to look up and paraphrase Geoff's comments on this company and the sector in the FM per my previous post. My trip to UD Library yesterday to find a copy did not bear fruit.

Although I have not formally introduced my potential candidate in G&K format yet I thought that I should point out that RSA Security Inc. is holding the ninth annual RSA Conference, January 16-20 2000, San Jose McEnery Convention Center.

Four companies from our G&K Index are exhibiting there (Cisco Systems, Intel, Microsoft, & Sun Microsystems) and Microsoft and Intel are two of the four show sponsors along with IBM & Compaq.

It is highly likely that some of your favorite wired or wireless Gorilla's & Kings & Candidates will be issuing press releases this week in conjunction with the show and you may wish to keep your antennae up for the words PKI or RSA enabled or RSA encryption.

The official show website is:

rsaconference.com

Please note that RSA Laboratories (RSA Security Inc. subsidiary) coordinates the intervendor Public-Key Cryptography Standards (PKCS). The 14 PKCS standards are available at:

rsasecurity.com

There is a good IDC whitepaper (possibly needs free registration) on "eSecurity" at:

rsasecurity.com

- Eric



To: Eric L who wrote (15237)1/17/2000 5:40:00 PM
From: John Stichnoth  Read Replies (1) | Respond to of 54805
 
Eric,

The mention of SDTI was very brief.

He called it Security software. Also bought Checkpoint, Cylink, McAfeee as competitors (p 311) in a Rule 2 "enabling hardware or software" game.

He does say, p 304, "None of these three markets has become a gorilla-game play as yet, althought RSA encryption for Security Dynamics is approaching that status; but they bear watching, . . ." The three markets were all security related, hardware level, middleware, and encryption software.

The page 304 reference is in a section called "GG Opportunities Inside the Tornado", in which he very briefly goes through five sub-games, in a chapter centering on Internet opportunities.

I don't see reference to anything else you mention, but the index is somewhat abbreviated, so some references may not have been indexed.

Hope this helps,
Best,
John

8. Can't comment on your dreams. <g>



To: Eric L who wrote (15237)1/17/2000 10:32:00 PM
From: quartersawyer  Read Replies (1) | Respond to of 54805
 
Eric L- please comment on the following:

Since the cryptosensitive operations (signing and decrypting) can be many times faster using ECC than using RSA, ECC is more appropriate for use in secure devices such as smart cards and wireless devices with constrained computational power. The noncrypto-sensitive (public key) operations can usually be performed in terminal or PC environments that typically have more computational power. Because the RSA crypto-sensitive operations require more computational power, they are less suitable for use in constrained environments, and as security (key size) requirements increase in the future, the problem could become worse.

certicom.com