From: John Young <jya@pipeline.com>
To: pfarrell@netcom.com
Message Hash: 64af3b86b6dd0a6e55bfdbc2a7cb5e208f031b0b77e0fa4c8e73275fa88ed2fb
Message ID: <199509111719.NAA08676@pipe1.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-09-11 18:22:01 UTC
Raw Date: Mon, 11 Sep 95 11:22:01 PDT
From: John Young <jya@pipeline.com>
Date: Mon, 11 Sep 95 11:22:01 PDT
To: pfarrell@netcom.com
Subject: NIST Hat Tricks
Message-ID: <199509111719.NAA08676@pipe1.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Pat,
A response to the quote below from your NIST Key Escrow web
site:
I got the full Discussion Paper #4 with all ten criteria from
the main desk, along with others that seemed to be appearing as
the day passed. (I'll fax a copies of any of the handouts to
anyone wanting hardcopy. We scanned all handouts.)
In breakout session B-2, we were also given only that part of
Paper #4 that dealt with our session's criteria 3, 4 and 9. It
was passed out at the end of the meeting after discussion had
ceased. We did not get a chance to discuss the "example
potential solutions."
Strange procedure: it seemed as if NIST was sleight-of-handing
prepared backup papers as if they anticipated resistance. Maybe
there would have been more concessions or more rabbits pulled
from the KE hat if there had been even louder "brrrrat-GAK."
Never too late to ask for those other trapped bunnies.
----------
[Excerpt from Pat's web site]:
* During the first breakout session, in the technical
discussion of
criteria # 5 and #6, an authorless (presumably
government issued)
"Example Potential Solutions" paper was distributed. It
caused a
lot of grumbling amongst the attendees, as they were
supposed to
discuss it, without any prior chance to read or react to
it. Here
are two versions of it, First, Anonymous Sample
Solutions (HTML by
PDF) and a simple ASCII version Sample Solutions (ASCII
text by
John Young)
I have not seen an electronic version of the paper that
I
received. It contains the following paragraph:
"Example Solutions to export criteria 5 and 6 are
indentified
below to help give a better feel for approaches that
implementors
may take to satisfy the criteria. The information in
this paper is
not intended to represent fail-sfe, cookie cutter
solutions to the
criteria, but only to generate more detailed
discussions."
It is also interesting to note that John Young has an
electronic
document with all of the sample solutions (a solution
for each of
the ten criteria. I never saw a paper document with all
ten
solutions. The one that was handed to me had only two
criteria, #5
and #6. I talked to attendees of other breakouts, and
they had
received nothing.
Return to September 1995
Return to “John Young <jya@pipeline.com>”
1995-09-11 (Mon, 11 Sep 95 11:22:01 PDT) - NIST Hat Tricks - John Young <jya@pipeline.com>