[110318] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Security team successfully cracks SSL using 200 PS3's and MD5

daemon@ATHENA.MIT.EDU (Skywing)
Fri Jan 2 17:52:13 2009

From: Skywing <Skywing@valhallalegends.com>
To: "Steven M. Bellovin" <smb@cs.columbia.edu>, Deepak Jain <deepak@ai.net>
Date: Fri, 2 Jan 2009 16:51:53 -0600
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

Of course, md5 *used* to be good crypto.

=96 S

-----Original Message-----
From: Steven M. Bellovin <smb@cs.columbia.edu>
Sent: Friday, January 02, 2009 14:46
To: Deepak Jain <deepak@ai.net>
Cc: NANOG <nanog@nanog.org>
Subject: Re: Security team successfully cracks SSL using 200 PS3's and MD5 =
     flaw.


On Fri, 2 Jan 2009 16:13:45 -0500
Deepak Jain <deepak@ai.net> wrote:

> > If done properly, that's actually an easier task: you build the
> > update key into the browser.  When it pulls in an update, it
> > verifies that it was signed with the proper key.
> >
>
> If you build it into the browser, how do you revoke it when someone
> throws 2000 PS3s to crack it, or your hash, or your [pick algorithmic
> mistake here].
>
If you use bad crypto, you lose no matter what.  If you use good
crypto, 2,000,000,000 PS3s won't do the job.

                --Steve Bellovin, http://www.cs.columbia.edu/~smb



home help back first fref pref prev next nref lref last post