CDR: Re: Rijndael & Hitachi
Jay Sulzberger
jays at panix.com
Wed Oct 11 21:05:41 PDT 2000
Excellent ideas.
And the place to start is with Arnold Reinhold's improvement to the
cyphers.
oo--JS.
On Wed, 11 Oct 2000, Ray Dillinger wrote:
>
>
> On Wed, 11 Oct 2000, Arnold G. Reinhold wrote:
>
> >The fact that some people put Medeco's in glass doors, doesn't mean
> >Medeco should never develop a better lock.
>
> I don't have a problem with people who manufacture locks.
> I have a problem with the people who sell them.
>
> A sign of irrational fear is when the thing that is the
> *symbol* of security -- in this case the lock, or the cipher,
> is made very strong -- but used in a way that does not afford
> good *actual* security.
>
> If the fear of being burgled weren't at least partly
> irrational, meaning if it were based mostly on experience
> rather than mostly on fear -- we'd be seeing doors with
> half-inch thick steel plates in them to provide the same
> level of security as the medeco lock -- and reinforced
> concrete walls to provide the same level of security as
> the door.
>
> Ditto ciphers. A strong cipher is like that Medeco
> lock, or even better - but if the "door" is a dumb
> key management policy, or the key is easily guessable,
> then what has been gained?
>
> Because what is a lock, really? It makes it harder to
> get in *without breaking anything*. But actual burglars
> could really care less whether they break some of your
> stuff -- provided it's stuff they can't steal. So if
> actual burglars were as common as the people who sell
> these fancy locks tend to make out in their sales pitches,
> most folks would know, from experience, that burglars
> who break a window or a door are far more common than
> burglars who pick a lock -- and would be demanding
> *actual* security, meaning windows, doors and walls made
> of unbreakable stuff, rather than just *symbolic* security,
> of a strong lock or a strong cipher.
>
> If you want to propose a "Paranoid Encryption Standard",
> IE, a system for people who actually *DO* expect people
> to spend several million bucks and hundreds of man-years
> and thousands of CPU-years trying to break it, then it's
> going to have to encompass a hell of a lot more than
> ciphers. Start with physical machine security -- put
> the box in a concrete bunker with armed guards, give it
> a flat-panel monitor and roll your own drivers and video
> hardware. Stick a thermite grenade with a photosensitive
> fuse in the hard drive box. Make a continuous circuit
> through all the case components, that will detect anybody
> taking the case off, and blow the HD if the circuit's
> broken. Do a couple dozen other things along this line,
> and you'll have the physical security thing covered about
> as well as your cipher protects the data.
>
> But you're not through yet -- you've got the lock and the
> door, but burglars can still come in through the windows
> and the walls. You've got to do some real serious data
> security as well.
>
> First of all, nothing unencrypted is EVER written to the
> hard drive except a bootstrap loader that prompts for a
> cipher key. When it gets the cipher key, it reads and
> attempts to unencrypt the rest of the boot record.
>
> There is NO swap partition, and no swapping OS is to be used.
>
> The system computes a new cipher key every day using a
> cryptographically strong random number generator, and notifies
> you of it in a pencil-and-paper cipher that you can solve.
> (on high-entropy binary data, pencil-and-paper ciphers are
> actually quite strong) That's the key you would need to
> use the following day. If you don't log on for one day,
> you will not have the key for the following day, period.
> Thus, if someone seizes your box and you can hold out for
> *one* day, the data is GONE.
>
> But the burglars can still come in, maybe, through the roof.
>
> So just to make sure of it, put a timer in there that blows
> the HD if it's ever been more than 24 hours since you were
> last logged on.
>
> *There's* your paranoid encryption standard. Use blowfish for
> the cipher, and the cipher won't be the weakest point.
>
> Bear
>
>
>
More information about the cypherpunks-legacy
mailing list