home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!haven.umd.edu!darwin.sura.net!dtix!mimsy!ra!atkinson
- From: atkinson@itd.nrl.navy.mil (Randall Atkinson)
- Newsgroups: sci.crypt
- Subject: Re: Secure network: what form?
- Message-ID: <3464@ra.nrl.navy.mil>
- Date: 27 Aug 92 22:08:18 GMT
- References: <9208272105.AA12700@news.cis.ohio-state.edu>
- Sender: usenet@ra.nrl.navy.mil
- Distribution: usa
- Organization: Naval Research Laboratory, DC
- Lines: 23
-
- In article <9208272105.AA12700@news.cis.ohio-state.edu> Marc.Ringuette@daisy.learning.cs.cmu.edu writes:
- >I presume we all agree that we should move towards some form of secure
- >email and some means of exchanging public keys. There are a number of
- >other cryptographic services we could ask for. I presume we do NOT all
- >agree on exactly what form they should take.
-
- Movement has been underway for some time now.
- Privacy-Enhanced Mail (PEM) should appear in the Internet within the
- year (famous last words :-). Older RFCs for PEM are online. A newer
- set was just/is about to be released.
-
- >How do you think we should take advantage of cryptography in the next
- >generation network? What tools would you use? What organization? Is
- >there anything you want particularly to avoid? I think it's important
- >for us to develop a more accurate vision of what it is that we want.
- >Otherwise, how will people know what to implement for us?
-
- All good questions. The IETF has several groups actively
- working on Internet Security, some under the Security Area and some
- under other areas.
-
- Ran
- atkinson@itd.nrl.navy.mil
-