[17383] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Papers about "Algorithm hiding" ?

daemon@ATHENA.MIT.EDU (Adam Shostack)
Tue Jun 7 19:50:36 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 7 Jun 2005 19:00:57 -0400
From: Adam Shostack <adam@homeport.org>
To: Ian G <iang@systemics.com>
Cc: John Kelsey <kelsey.j@ix.netcom.com>,
	Steve Furlong <demonfighter@gmail.com>, cryptography@metzdowd.com
In-Reply-To: <200506071741.16876.iang@systemics.com>

On Tue, Jun 07, 2005 at 05:41:12PM +0100, Ian G wrote:

| 
| The difficulty here is that there is what we might call
| the Choicepoint syndrome and then there is the
| specific facts about the actual Choicepoint heist.
| When I say Choicepoint I mean the former, and the
| great long list of similar failures as posted last week.

Poor form there.
| No it's not rocket science - it's economic science.
| It makes no difference in whether the business is
| small or large - it is simply a question of costs.  If
| it costs money to do it then it has to deliver a
| reward.
| 
| In the case of the backup tapes there was no reward
| to be enjoyed.  So they could never justify encrypting
| them if it were to cost any money.  Now, in an unusual

Actually, that's not true.  Over 10 years ago, I wrote a small script
that took data very much like this, encrypted it, verified the
output looked like PGP encrypted data, and copied it to a public ftp
site so that a partner could pick it up.

That saved a lot over tape, and reduced manual steps which introduced
errors.

Adam

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post