[13919] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Crypto Hygiene?

daemon@ATHENA.MIT.EDU (Steve Schear)
Fri Aug 22 11:14:05 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 21 Aug 2003 23:04:10 -0700
To: dmolnar <dmolnar@hcs.harvard.edu>, cryptography@metzdowd.com
From: Steve Schear <s.schear@comcast.net>
In-Reply-To: <Pine.OSF.4.53.0308111641001.17130@hcs.harvard.edu>

At 04:45 PM 8/11/2003 -0400, dmolnar wrote:

>(also posted to sci.crypt in modified form)
>
>At Usenix Security, Eric Rescorla pointed out that some of the
>cryptographic flaws we have seen can be prevented by applying good
>"crypto hygiene." My questions for the floor --
>
>         * What is "good hygiene" ?
>         * Where would I find it written down?
>         * How do we develop good hygiene?

The problems implementing reliable crypto seem to parallel the problems 
which plagued early digital logic design.  Although digital logic operates 
as if only zeros and ones exist, in fact the physics underlying the circuit 
components is analog.  Until technologists developed SSI, MSI and later LSI 
circuits, which pretty effectively "walled off" the analog world, engineers 
were forever chasing analog demons in their digital designs.  Now these 
problems generally appear only when circuits or their environment (e.g., 
speed, temperature and voltage) exceed design parameters.

Mark Miller's approach using "E" may be one approach for applying the 
"walling off" practiced in digital design for security.

steve


"...for every complex problem, there is a solution that is simple, neat, 
and wrong."
-- H.L. Mencken 


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post