Re: [Cryptography] Crypto Standards v.s. Engineering habits - Was: NIST about to weaken SHA3?

----- Forwarded message from Phillip Hallam-Baker <hallam@gmail.com> ----- Date: Fri, 4 Oct 2013 09:57:39 -0400 From: Phillip Hallam-Baker <hallam@gmail.com> To: Alan Braggins <alan.braggins@gmail.com> Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com> Subject: Re: [Cryptography] Crypto Standards v.s. Engineering habits - Was: NIST about to weaken SHA3? Message-ID: <CAMm+LwgXC4QmA+a9MaVzRJZ+ce=R0Uap8Z3qb6ehiii=qTYQCg@mail.gmail.com> On Thu, Oct 3, 2013 at 5:38 AM, Alan Braggins <alan.braggins@gmail.com>wrote:
The case is described in Why Buildings Fall Down. The original design was sound structurally but could not be built as it would have required the entire length of the connection rod to be threaded. There was no way to connect one structure to the other. The modified design could be built but had a subtle flaw: the upper skyway was now holding the entire weight of both The strength of the joint was unaffected by the change but the load on the joint doubled. We see very similar effects in cryptographic systems. But the main problem is that our analysis apparatus focuses on the part of the problem we know how to analyze rather than the part of the problem that fails most often. Compare the treatment of coding errors in cryptographic software and the treatment of CA mis-issue. Coding errors are much more likely to impact the end user and much more likely to occur. But those get a free pass. Nobody has ever suggested that the bugs in Sendmail in the early 1990s should have stopped people using the product (OK apart from me). But seven mis-issued certificates and there is a pitchfork wielding mob outside my house. The fact that the Iranian Revolutionary Guard has a web site filled with hijacked software that is larded up with backdoors completely missed the attention of most of the people worrying about the seven certificates, all of which were revoked within minutes and would be rejected by any browser that implemented revocation checking like they should. But much easier to flame on about the evils of CAs than ask why the browser providers prefer shaving a few milliseconds off the latency of their browser response than making their customers secure. Oh and it seems that someone has murdered the head of the IRG cyber effort. I condemn it without qualification. There are many people who have a vested interest in keeping wars and confrontations going. There are many beltway contractors who stand to make a lot of money if they can persuade the US people to fund a fourth branch of the military to fight cyber wars and fund it as lavishly as they have foolishly funded the existing three. A trillion dollars a year spent on bombs bullets and death is no cause for pride. Nobody should ever carry a gun or wear a military uniform with anything other than shame for the fact that our inability to solve our political issues without threat of violence makes it necessary. We do not need to spend hundreds of billions more on a new form of warfare. But there are many who would get a lot richer if we did. As Eisenhower observed, spending too much on the military makes the country less safe. If politicians believe their war machine is invincible, some stupid fool is going to use it just because they can. Just like the last President did. At the end of the cold war when the Soviet Union was on its knees, so was Margaret Thatcher, begging Gorbachev to send the tanks into East Berlin and stop the collapse of the enemy that her world was built in opposition to. And Thatcher claimed to be speaking for the other Western leaders as well. I have the transcript of the meeting if anyone is interested. While most of the information on the Comodo attack is in the public domain there is some that was with-held. The reason was not to protect Comodo but to protect the attacker in the unlikely event that they were actually telling the truth and they were acting outside government direction. The chance is very small but if they were acting on their own initiative and had diverted the entire Iranian Internet they would risk a long prison sentence, possibly a capital sentence if they were caught. I am not going to provide the Iranian authorities with information that could assist them in that even if the guy had attacked us. One of the more ridiculous spectacles resulting from PRISM is the parade of establishment worthies telling us that we don't need to be worried about the government intercepts and we should not worry our silly heads about matters that are too complex to understand. Well I knew quite a few members of the British cabinet when they were up at Oxford, I have known politicians all my life, my cousin was a cabinet member, I have met world leaders and acknowledged leading foreign policy experts. That experience gives me absolutely no confidence in the establishment worthies. -- Website: http://hallambaker.com/ _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
participants (1)
-
Eugen Leitl