1997-05-13 - Re: The War is Underway (fwd)

Header Data

From: Adam Shostack <adam@homeport.org>
To: unicorn@schloss.li (Black Unicorn)
Message Hash: 3fd9f9784a91d0f18f9eb9779a06eeace9f21752c1e442293ea09c1cfbce688c
Message ID: <199705131154.HAA20161@homeport.org>
Reply To: <Pine.SUN.3.96.970511125117.9012O-100000@polaris.mindport.net>
UTC Datetime: 1997-05-13 12:23:35 UTC
Raw Date: Tue, 13 May 1997 20:23:35 +0800

Raw message

From: Adam Shostack <adam@homeport.org>
Date: Tue, 13 May 1997 20:23:35 +0800
To: unicorn@schloss.li (Black Unicorn)
Subject: Re: The War is Underway (fwd)
In-Reply-To: <Pine.SUN.3.96.970511125117.9012O-100000@polaris.mindport.net>
Message-ID: <199705131154.HAA20161@homeport.org>
MIME-Version: 1.0
Content-Type: text/plain


Black Unicorn wrote:

| > Systems that use randomly generated keys are
| > limited only by the amount of available entropy, but then the passphrase
| > security to encrypt the secret key or physical security become important.
| > Using excessively long keys does not do much for security, as there are
| > always going to be weaker links that an attacker can take advantage of.
| > It doesn't hurt to use a 256-bit key, or larger, but it doesn't do much
| > good, either.
| 
| Again, you have taken an important concept, total security, and reversed
| it.  Instead of aiming to make each link as strong as possible, you have
| aimed to design around the weakest link.
| 
| This is a serious mistake in my view.

	I disagree with your approach.  In the real world, budgets are
limited, time is limited, the pool of really decent people on any
given project is small.  Fixing or strengthening the weakest link is
my usual approach to these things.  Not as nice as having a
bulletproof design from the start, but there aren't enough smart
cypherpunks out there consulting.  (More on that in another post.)

| It costs little today to develop a cipher with larger keyspace.  (DES with
| independent subkeys already exists and has a basic keyspace of 768 bits.
| A meet in the middle attack reduces keyspace to 2^384.  Schneier discusses
| the cipher briefly).  If users are willing to deal with large keys (I
| certainly am) then software designers are restraining a more secure
| implementation.

	It takes an academic cryptographer about 6 months to develop a
cipher.  Most academics don't see a point to moving beyond the 448
bits available in Blowfish.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume







Thread