[144316] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Activation protocol for tracking devices

daemon@ATHENA.MIT.EDU (Santiago Aguiar)
Mon Mar 2 19:01:24 2009

Date: Mon, 02 Mar 2009 18:47:04 -0200
From: Santiago Aguiar <santiago.aguiar@gmail.com>
To: John Ioannidis <ji@tla.org>
CC: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <49AC3F03.7030609@tla.org>

John Ioannidis wrote:
> Just don't do it.  If you are going to spend your energy on anything, 
> it should be to work against such a plan.
I would agree, but I fear that a "this is never going to work, drop it" 
will be less heard than any effort in at least trying to raise the bar 
for an attack. 

The previous proposed solution at the work group was that the service 
provider 'configured' the device with an authentication 'word' upon 
activation an made sure that that 'word' was always present on each 
message to authenticate it. The only benefit I can see in it (that could 
very likely been accepted if no one objected) is that is so simple that 
all bugs are obvious...

But I accept that the false sense of security of a complex scheme that 
is broken somewhere _maybe_ worse than an obviously wrong solution...

Santiago.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post