From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: aa2858cf4406e92ed00468763b459d3826efc94abeeae63680621cc5a956e04d
Message ID: <199502011653.IAA05730@largo.remailer.net>
Reply To: <199502011528.KAA23229@crypto.com>
UTC Datetime: 1995-02-01 16:54:28 UTC
Raw Date: Wed, 1 Feb 95 08:54:28 PST
From: eric@remailer.net (Eric Hughes)
Date: Wed, 1 Feb 95 08:54:28 PST
To: cypherpunks@toad.com
Subject: Re: The security characteristics of crypto modules with secrets
In-Reply-To: <199502011528.KAA23229@crypto.com>
Message-ID: <199502011653.IAA05730@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain
The advantage of a secure crypto module on an insecure server (or
router or whatever) is in limiting the scope of successful attack.
Just to expand on this, the scope is limited in _time_, not space.
That's, when you pull out the module (literally or figuratively), the
attack is known to be over -- and don't plug it back into a machine of
unknown state.
The main important
difference between this attack and just learning the server's secret
is that it only remains useful as long as the attack is undiscovered.
Yes. Typically, once the attack is discovered, the method used in the
attack is also discovered. The particular hole is then patched. The
system can now be put back online without fear of immediate
re-compromise.
Eric
Return to February 1995
Return to “norm@netcom.com (Norman Hardy)”