|        |   
 | Topics this page: 
 | 
  Related Topics:  | 
| 
 | 
  Entrust
	
	TruePass FIPS 140-1 Level 1 certified Web portal security solution does not require installation of an internet browser plug-in because it provides an html page
	that transparently downloads a Java applet that creates digital signatures using a "profile" (epf) file
	pre-generated for a specific user and stored on the machine's local drive (preferrably a removeable diskette or USB drive). Entrust TruePass 7.0 delivers support for a 3-key pair model that defines a separate key pair to perform encryption, authentication, and digital signatures, as required by IETF RFC 3039 and European Union Digital Signature Directive. Explanation of this by the US Patent and Trademark Office and this company. |       | 
| 
 | 
	 
	
	 
	
	 
	
	 |       | 
| 
 |       | 
| 
 |    Introduction to Cryptography With Java Applets (Jones & Bartlett Publishers, Inc., 2003)
	by David Bishop (a professor Grinnell College) offers online Java applets to demonstrate important concepts 
	to help undergrads learn to program cryptography algorithms from the ground up. 
	Topics include large integer computing, linear cyphers, matrix cyphers, primality testing, 
	and establishing keys and message exchange. 
	
	 
	
	 
	 
	 |       | 
| 
 |  Microsoft's white paper: Encrypting File System 
	 
	 
	 
	 Microsoft Corporation. Windows 2000 Server Resource Kit . Volume: Microsoft Windows 2000 Server Distributed Systems Guide . Redmond, Washington: Microsoft Press, 2000. Chapter 15, "Encrypting File System." Microsoft Corporation. MCSE Training Kit: Microsoft Windows 2000 Server . Redmond, Washington: Microsoft Press, 2000. Lesson 2 in Chapter 11, "Microsoft Windows 2000 Security." Alternatives for MS-EFS DriveCrypt uses 256 bit steganographic techniques (hiding data in music files). 
	
	 
	
	 
	
	 
	
	 
	
	 Users enter their password in the product, which then automatically supplies the Windows password. The main reason why companies buy EPHD is that it has a remote corporate key recovery mechanism. The product supports a one-time password in case users get locked out of their data. It can run on NT and Windows 9x. |       | 
| 
 | 
 
	 |       | 
| 
 | 
 |       | 
| 
 | 
  Eracom CSA8000 hardware and API Cprov for C and 
	Jprov for working with Java Cryptography Extension (JCE), a standard extension to the 
	Java Cryptography Architecture (JCA). 
 Applications requiring Crypto KeysApplications that require secure hardware, including access control via a user token, and cryptographically intensive applications, such as SSL server applications. Other examples include:
 |       | 
| 
 | 
 
 
	 
 |       | 
|   
 | Your first name: Your family name: Your location (city, country): Your Email address: | Top of Page   Thank you! | |||