[144633] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

cleversafe says: 3 Reasons Why Encryption is Overrated

daemon@ATHENA.MIT.EDU (Zooko Wilcox-O'Hearn)
Fri Jul 24 13:44:34 2009

To: tahoe-dev@allmydata.org,
 Cryptography List <cryptography@metzdowd.com>
From: Zooko Wilcox-O'Hearn <zooko@zooko.com>
Date: Fri, 24 Jul 2009 07:33:29 -0600

[cross-posted to tahoe-dev@allmydata.org and cryptography@metzdowd.com]

Disclosure:  Cleversafe is to some degree a competitor of my Tahoe-=20
LAFS project.  On the other hand, I tend to feel positive towards =20
them because they open-source much of their work.  Our "Related =20
Projects" page has included a link to cleversafe for years now, I =20
briefly collaborated with some of them on a paper about erasure =20
coding last year, and I even spoke briefly with them about the idea =20
of becoming an employee of their company this year.  I am tempted to =20
ignore this idea that they are pushing about encryption being =20
overrated, because they are wrong and it is embarassing.  But I've =20
decided not to ignore it, because people who publicly spread this =20
kind of misinformation need to be publicly contradicted, lest they =20
confuse others.

Cleversafe has posted a series of blog entries entitled "3 Reasons =20
Why Encryption is Overrated".

http://dev.cleversafe.org/weblog/?p=3D63 # 3 Reasons Why Encryption is =20=

Overrated
http://dev.cleversafe.org/weblog/?p=3D95 # Response Part 1: Future =20
Processing Power
http://dev.cleversafe.org/weblog/?p=3D111 # Response Part 2: =20
Complexities of Key Management
http://dev.cleversafe.org/weblog/?p=3D178 # Response Part 3: Disclosure =20=

Laws

It begins like this:

"""
When it comes to storage and security, discussions traditionally =20
center on encryption.  The reason encryption =96 or the use of a =20
complex algorithm to encode information =96 is accepted as a best =20
practice rests on the premise that while it=92s possible to crack =20
encrypted information, most malicious hackers don=92t have access to =20
the amount of computer processing power they would need to decrypt =20
information.

But not so fast.  Let=92s take a look at three reasons why encryption =20=

is overrated.
"""

Ugh.

The first claim -- the today's encryption is vulnerable to tomorrow's =20=

processing power -- is a common goof, which is easy to make by =20
conflating historical failures of cryptosystems due to having too =20
small of a crypto value with failures due to weak algorithms.  =20
Examples of the former are DES, which failed because its 56-bit key =20
was small enough to fall to brute force, and the bizarre "40-bit =20
security" policies of the U.S. Federal Government in the 90's.  An =20
example of the latter is SHA1, whose hash output size is *not* small =20
enough to brute-force, but which is insecure because, as it turns =20
out, the SHA1 algorithm allows the generation of colliding inputs =20
much quicker than a brute force search would.

Oh boy, I see that in the discussion following the article "Future =20
Processing Power", the author writes:

"""
I don=92t think symmetric ciphers such as AES-256 are under any threat =20=

of being at risk to brute force attacks any time this century.
"""

What?  Then why is he spreading this Fear, Uncertainty, and Doubt?  =20
Oh and then it gets *really* interesting: it turns out that =20
cleversafe uses AES-256 in an All-or-Nothing Transform as part of =20
their "Information Dispersal" algorithm.  Okay, I would like to =20
understand better the cryptographic effects of that (and in =20
particular, whether this means that the cleversafe architecture is =20
just as susceptible to AES-256 failing as an encryption scheme such =20
as is used in the Tahoe-LAFS architecture).

But, it is time for me to stop reading about cryptography and get =20
ready to go to work.  :-)

Regards

Zooko
---
Tahoe, the Least-Authority Filesystem -- http://allmydata.org
store your data: $10/month -- http://allmydata.com/?tracking=3Dzsig
I am available for work -- http://zooko.com/r=E9sum=E9.html=

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post