ADSM security
1994-11-03 18:29:26
Ref: Your note of Thu, 3 Nov 1994 14:07:33 EST
I don't believe the algorithm is published and
I don't know of any intentions to publish. I will
say that it involves random private keys, the use of the
password as an encryption key, and mutual exchanges
of data to ensure that each party is who they claim
to be. If you have a need for more detailed information,
I'd suggest contacting the technical support group;
Data from files is sent as clear text unless it
is compressed on the client side. The requirement
for optional encryption is known.
Barry Fruchtman
ADSM Server Development
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- ADSM security, David G. Kalenderian
- Re: ADSM security, Melinda Varian
- ADSM security, Barry Fruchtman
- ADSM security, Chris Zaremba 8-852-2331 (FAX 852-1757)
- Re: ADSM security, Melinda Varian
- Re: ADSM security, Bob Klein
- Re: ADSM security, Melinda Varian
- ADSM security,
Barry Fruchtman <=
- Re: ADSM security, Deba Patnaik OBPIB 32736
- Re: ADSM security, Gerhard Schneider 608-2479 (0721)
- Re: ADSM security, Roy Jaques
- ADSM security, Chris Krusch
|
|
|