[144280] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: SHA-3 Round 1: Buffer Overflows

daemon@ATHENA.MIT.EDU (Darren J Moffat)
Tue Feb 24 13:23:18 2009

Date: Mon, 23 Feb 2009 22:16:25 +0000
From: Darren J Moffat <Darren.Moffat@Sun.COM>
In-reply-to: <7d752ae30902231305odd94eb2h2355cbe7f3d3f9e2@mail.gmail.com>
To: Steve Furlong <demonfighter@gmail.com>
Cc: Cryptography <cryptography@metzdowd.com>, cypherpunks@al-qaeda.net,
        gold-silver-crypto@rayservers.com

Steve Furlong wrote:
>>> This just emphasizes what we already knew about C, even the most
>>> careful, security conscious developer messes up memory management.
> 
>> However I think it is not really efficient at this stage to insist on secure
>> programming for submission implementations.  For the simple reason that
>> there are 42 submissions, and 41 of those will be thrown away, more or less.
>>  There isn't much point in making the 41 secure; better off to save the
>> energy until "the one" is found.  Then concentrate the energy, no?
> 
> Or stop using languages which encourage little oopsies like that. At
> the least, make it a standard practice to mock those who use C but
> don't use memory-safe libraries and diagnostic tools.

As long as you mean use an alternate language for the competition. 
Realistically there has to be C (or in many cases even asm) 
implementations of these algorithms if they are actually going to be 
adopted in real operating systems and real applications.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post