[12491] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Columbia crypto box

daemon@ATHENA.MIT.EDU (Adam Fields)
Mon Feb 10 14:31:45 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Mon, 10 Feb 2003 10:54:14 -0500
From: Adam Fields <fields@surgam.net>
To: "Steven M. Bellovin" <smb@research.att.com>
Cc: Pete Chown <Pete.Chown@skygate.co.uk>,
	cryptography@wasabisystems.com
In-Reply-To: <20030210043401.298CD7B4D@berkshire.research.att.com>

On Sun, Feb 09, 2003 at 11:34:01PM -0500, Steven M. Bellovin wrote:
> First, there was no key management.  This means that loss of a single 
> unit -- a stolen laptop or a disgruntled (ex-)employee would do -- 
> compromises the entire network, since it's impossible to rekey 
> everything at once in an organization of any size.  For most real-world 
> deployments, this is the most serious weakness.  Furthermore, if there 
> were real key management, the next two problems couldn't have happened.
> This was clearly avoidable.

Practically, what's the right way to do this? You could do it with a
centralized server key that has the ability to broadcast a new shared
key to all clients, but then if the server gets compromised you lose
control of the entire network (possibly true anyway, for different
reasons).

>From my personal (limited) experience, key management is really
hard. I'm curious about potential solutions to this.

-- 
				- Adam

-----
Adam Fields, Managing Partner, fields@surgam.net
Surgam, Inc. is a technology consulting firm with strong background in
delivering scalable and robust enterprise web and IT applications.
http://www.adamfields.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post