Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

Re: [News] No Such Thing as Security Through Obscurity

  • Subject: Re: [News] No Such Thing as Security Through Obscurity
  • From: Hadron <hadronquark@xxxxxxxxxxxxxx>
  • Date: Fri, 25 Jan 2008 15:50:47 +0100
  • Bytes: 6552
  • Cancel-lock: sha1:BS6R+Q75dO2AamAFwWQl1tCY3E4=
  • Face: iVBORw0KGgoAAAANSUhEUgAAADAAAAAwBAMAAAClLOS0AAAAKlBMVEUEAgJbIBVoY15hUCmc FhbtGBOVZkLntRzywheujjymop7OsJ7u07Lq6eilId+TAAAACXBIWXMAAABIAAAASABGyWs+AAAB 60lEQVQ4y83STUgVURjG8f85k6j3lp6xTS6MMaGNGiP0DQVhtAssolbWLAJBau2mYnLRx06Ckhbl bIooBGkXGAZBFPQxcKNNdNNNRMid46LIdDot7nTHcaZ9Zzk/znvmfXgk/zjyv4ftqhjkvRvF0Cp6 txWCoPbQKQKD/Hw5D5a7gqbDWg/WqzvT4oq52AzQFYCE6QBo4ffPqKYqWwD0fpDg+vWbQj1STy4B OMvpqBjhg1R9LsgZAxLCx8Ay/AAwIaKXsoMEtzwA8RlMAHyFvhkYR1IivODAh6nB+5raUagAZUfS g+v6YG4ed0d2HQGsGBiXlg8xAN78JwMQ7x6if68sAaEH8K2a/KGuDFsvZVc/30/+zcE+fMIGeDEk pFVhR/rdFoMAvB+WuM8bue+kyWv2kqSb3niNgBWy2xxL0n3beAAgMitWvgw2lCYIiuujk6Uy4Ca0 HjbUa/UuB5tmdRTpgpZEWq0+VcnAzBvWYsji7LM8rM5pMxflR2VPHsRABjw6gE727Rk7NbEGrM7b ZwHn6oFD8CUFcWtrtUfRelB0K8XmFFpqUB1RbYIlkgrU4bRYsG3b0/VQSinYKMD+1Q6w5KfgAGDM uQUdtU3qFKYAzDzx5LXro3rNHq/bNWwM8pvHo3c/PjifCeAPa9eNC9aoFNgAAAAaelRYdEpQRUct Q29sb3JzcGFjZQAAeNozAgAAMwAzERZ+YwAAACp6VFh0SlBFRy1TYW1wbGluZy1mYWN0b3JzAAB4 2jOqMNIxrDDUMawwBAARgwLpBsTKKAAAAABJRU5ErkJggg==
  • Newsgroups: comp.os.linux.advocacy
  • Organization: http://en.wikipedia.org/wiki/Quark
  • References: <2012409.slnAGPRM68@xxxxxxxxxxxxxxx> <c1vm65-7gq.ln1@xxxxxxxxxxxxxxxxxxxxxx> <4106423.fj5nL5YvKW@xxxxxxxxxxxxxxx> <7hto65-nfb.ln1@xxxxxxxxxxxxxxxxxxxxxx>
  • User-agent: Gnus/5.11 (Gnus v5.11) Emacs/22.1 (i686-pc-linux-gnu Debian-Lenny)
  • Xref: ellandroad.demon.co.uk comp.os.linux.advocacy:598309
Mark Kent <mark.kent@xxxxxxxxxxx> writes:

> Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx> espoused:
>> ____/ Mark Kent on Thursday 24 January 2008 17:38 : \____
>> 
>>> Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx> espoused:
>>>> New $2B Dutch Transport Card is Insecure
>>>> 
>>>> ,----[ Quote ]
>>>>| Kerckhoffs?s Principle, one of the bedrock maxims of cryptography, says
>>>>| that security should never rely on keeping an algorithm secret. It?s okay
>>>>| to have a secret key, if the key is randomly chosen and can be changed when
>>>>| needed, but you should never bank on an algorithm remaining secret.
>>>>| 
>>>>| Unfortunately the designers of Mifare Classic did not follow this
>>>>| principle. Instead, they chose to combine a secret algorithm with a
>>>>| relatively short 48-bit key. This is a problem because once you know the
>>>>| algorithm it?s possible for an attacker to search the entire 48-bit key
>>>>| space, and therefore to forge cards, in a matter or days or weeks.
>>>>| 
>>>>| [...]
>>>>| 
>>>>| Now the Dutch authorities have a mess on their hands. About $2 billion have
>>>>| been invested in this project, but serious fraud seems likely if it is
>>>>| deployed as designed. This kind of disaster would have been more likely had
>>>>| the design process been more open. Secrecy was not only an engineering
>>>>| mistake (violating Kerckhoffs?s Principle) but also a policy mistake, as it
>>>>| allowed the project to get so far along before independent analysts had a
>>>>| chance to critique it. A more open process, like the one the U.S.
>>>>| government used in choosing the Advanced Encryption Standard (AES) would
>>>>| have been safer. Governments seem to have a hard time understanding that
>>>>| openness can make you more secure.
>>>> `----
>>>> 
>>>> http://www.freedom-to-tinker.com/?p=1250
>>>> 
>>> 
>>> It's taken me a *very* long time to understand what goes wrong in the
>>> thinking of non-technical people in this security space, but I've cracked
>>> it, at least in my own mind, anyway.  The problem is that few people
>>> comprehend the difference between "secure" and "secret" at least when
>>> it comes to technology.
>>> 
>>> * Most people can understand that a bank is safe because it is secure, not
>>> because it's a secret.
>>> 
>>> * Most people can understand that a secret, once "out", is, well, no
>>> longer secret.
>>> 
>>> * Security, for the bank, is addressed through buildings, equipment, and
>>> processes.
>>> 
>>> * Secrecy, on the other hand, only has one possible route. As the "wise
>>> woman" in Black Adder said, the only way you could keep something secret
>>> from the world is to kill everyone in the world.
>>> 
>>> * Security, however, assumes that everyone already knows what and where
>>> the target is.
>>> 
>>> Most people would see the above remarks as being pretty-much self-evident,
>>> or common-sense, or some other version of "but I already knew that".
>>> However, when you apply the same thinking to the example above, they
>>> fall apart, because whilst they can understand, broadly, how a lock or a
>>> safe works, even how bars on windows and burglar alarms work, they
>>> *cannot* grasp that a weak algorithm is like a poor lock.
>>> 
>>> Keeping the key pattern a "secret" is no protection if the lock is poor,
>>> again, most people will understand that, but what they lack is the
>>> comparison between algorithm=lock and key=key.
>>> 
>>> Naturally, if you give away your key, you will negate the effect of the
>>> algorithm, unless, as in any lock, you *change* the key.
>>> 
>>> Hmm, I think I might write a beginner's paper on this.
>> 
>> Do another article for linux.com. They'll accept it, I'm sure.
>> 
>
> A good suggestion, I think I will.  This is a fantastic simplification
> of the problem, I think.

You would think that. In my opinion it is a fantastic complication of a
problem you yourself seem to have fabricated. You're an egotistical wind
bag and I suspect any article by you would send a viagra to sleep.

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index