Message-Id: <199908051655.JAA06500@taller.eng.sun.com>
Date: Thu, 5 Aug 1999 09:53:27 -0700 (PDT)
From: Roland Jones <Roland.Jones@eng.sun.com>
Subject: Re: JAVA Cryptography Extension
To: java-security@java.sun.com, jchan@cse.unsw.edu.au, Sharon.Liu@eng.sun.com
Jeremy,
This is a goverment law, not our decision. There is nothing we can do other than
point you to the clean room implementations.
Roland Jones
Jave Security Marketing
> Date: Thu, 5 Aug 1999 09:10:22 -0700 (PDT)
> From: Sharon Liu <Sharon.Liu@eng.sun.com>
> Subject: Re: JAVA Cryptography Extension
> To: java-security@java.sun.com, jchan@cse.unsw.edu.au
> MIME-Version: 1.0
> Content-MD5: Sfmd9UF7Z+g5v5hxpW2GUA==
>
> Jeremy,
>
> There are JCE clean room implementations available in Australia.
> Please check out http://java.sun.com/products/jce/jce12_providers.html
> for more information.
>
> Thanks,
> Sharon
>
> > To: java-security@java.sun.com
> > X-Sender: jchan@pipe08.orchestra.cse.unsw.EDU.AU
> > Subject: JAVA Cryptography Extension
> > MIME-Version: 1.0
> >
> > Dear Sir/Madam,
> >
> > I am a telecommunication engineering undergraduate at the
> > University of New South Wales Australia. I am currently writing a thesis
> > on web server security. I have chosen to use the Java platform to develop
> > my proxy server and client. It was with great disappointment that I noted
> > that your Cryptography Extension was limited to the United States and
> > Canada only. I would appreciate it if you could review the situation and
> > allow me to obtain a copy of the extension. I am currently developing my
> > proxy concurrently on both MS Windows 98 and Solaris (which I have
> > purchased the academic version).
> >
> > I look forward to your favourable reply.
> >
> > Thank you.
> >
> > Yours sincerely,
> >
> > Jeremy Chan
> >
> > ==========================================================
> > || It is easy to run a secure computer system. You merely ||
> > || have to disconnect all dial-up connections and permit ||
> > || direct wired terminals, put the machine and its ||
> > || terminals in a shielded room, and post a guard at the ||
> > || door. ||
> > || - F.T. Grampp and R.H Morris (Bell Labs) ||
> > ==========================================================
> >
> >
>