Thanks, yes it's the export restrictions I'm curious about.
Anyone who has experience of this, your input would be greatly appreciated. What hoops, if any, did you have to jump through?
yes. essentially it breaks down like this.
if you are using 1-way encryption known as hashing you are fine. ie. SHA, MD5, etc.
If you use two-way encryption then you are either:
using it for the purpose of authentication (i.e PKI type) or doing the full authentication + encryption scheme
Both are the those two radio boxes when submitting an application.
I personally avoided the whole fiasco and dealing with the US state dept. so i created a equivalent strength security protocol for the purposes of authentication against a server from an iPhone endpoint by using only 1-way encryption. it is mathematically almost equivalent to a PKI strengths minus some assumptions.
I did not need to encrypt data after authentication since it was not sensitive and using 2-way encryption for authentication was more hassle, certificates, etc. no point. these are consumer grade products.
J