-----BEGIN PGP SIGNED MESSAGE----- On Tue, 19 Dec 2000, Scoville, Chad wrote:
I've been actively reading posts on this list for about two years now, and I'm in he process of actually trying to design/implement a data network where security is of the utmost priority. Where is a good starting point to
If security is the utmost priority, you will not want "bleeding-edge" cryptography. You will want algorithms that have been tried and tested in the field already, and have not shown weaknesses. You will also want to use existing solutions, such as TLS, PGP, etc., if these will serve your needs. Developing new solutions to solved problems is not usually productive. If your interest is in deploying a system quickly, you will probably want to hire an independent consultant with background in email security. You may wish to have someone design the system architecture, detailing plans for implementation of all the necessary components to address your needs. Then you can build according to his or her spec in house. - -MW- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.3 (GNU/Linux) Comment: No comment. iQEVAwUBOkL7NSsFU3q6vVI9AQHCtwgArBg5CizLz/v8eIZVVI0bcC1SkJBZDUSl vKP6lTDzIET042LaSHQXpdgLhcXfP/8iayjjdZPhuaEYap0zj+6NWjgF0qFAU5D/ 4nr6/Y8GCG2b9hJ2VY6s+jEXuSRjzkHKxKdOf1+Dz61+Eub5pBYEsOjaSbWygMy0 1sK+RjNXL1W8/ZmrgGNhLGoD/LZAowrvOiyi7mQZQLjvbFVYOvIaY1zT3u/3T9ga DRWrNpaUK/Qndj7KUptBouFu0CfYopRl+R8d3LuDW5XyO86Z+pPDZHXxYN0MOeYl gKgM3VX3/tu8jfMNpWHJEjHOK4b/QStEI31IiclWHlgP0tovjxDKMA== =E1c9 -----END PGP SIGNATURE-----