[144786] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: SHA-1 and Git (was Re: [tahoe-dev] Tahoe-LAFS key management,

daemon@ATHENA.MIT.EDU (James A. Donald)
Wed Aug 26 22:20:13 2009

Date: Thu, 27 Aug 2009 10:36:08 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
CC: ben@links.org, perry@piermont.com, cryptography@metzdowd.com
In-Reply-To: <E1MgRwO-0000qB-F9@wintermute01.cs.auckland.ac.nz>

Peter Gutmann wrote:
 > Consider for example a system that uses two
 > authentication algorithms in case one fails, or that
 > has an algorithm-upgrade/rollover capability, perhaps
 > via downloadable plugins.  At some point a device
 > receives a message authenticated with algorithm A
 > saying "Algorithm B has been broken, don't use it any
 > more" (with an optional side-order of "install and run
 > this plugin that implements a new algorithm instead").
 > It also receives a message authenticated with
 > algorithm B saying "Algorithm A has been broken, don't
 > use it any more", with optional extras as before.

Not so hard.  True breaks occur infrequently.  Those
that download the scam version will find that they can
*only* communicate with the scammers, so will sort
things out in due course and all will be well until the
next break - which will not happen for a long time, and
may well never happen - unless of course one has the
IEEE 802.11 working group designing the standards.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post