The encryption scheme you rely on today might be full of holes just a few years down the road. Learn how far we’ve come in the last few decades, and why your apps need to be ready for change. This article builds on a previous article about Enigma, Germany’s WWII-era encryption system.
Modern History of Cryptography Techniques
Submitted by anonymous 2005-08-17 Privacy, Security 2 Comments
This is little more than a disguised marketing attempt to sell the IBM PCIXCC cryptographic PCI-X processor board (‘the right coprocessor’). The catch is that this board only ships on (no shock here) IBM eServer hardware.
There are pluggable boards available on the market today that have the same open source codebase (Win, Linux, etc.) as well as pluggable ciphers, can run at higher bitrates with better interface options (what’s the point of putting a 10/100 NIC interface on a board that can encrypt at GigE speeds?), and can be used with any system, not just an IBM eServer.
The article is basically a plug for the IBM PCIXCC and weakly done at that.