Who We Are

10/25/99


Click here to start


Table of Contents

PPT Slide

Who We Are

Security Research in IBM

Topics covered

Goal: A Secure System

Research Design Goal #1

Research Design Goal #2

Practical Goals and Constraints

Designing and Building a System

What We Built 4758 Cryptographic Coprocessor

4758 Coprocessor Hardware

4758 Coprocessor Software

Layer 2 Software Architecture

The Kernel

Communications, Host-to-Coprocessor

Secure Persistent Storage

Public Key Cryptography

DES

Random Number Generation

The Application Layer

Hindsight

Implementation Issues

Integration issues

API Extensions to-date

Summary of Services

Author: User