1995-09-21 - Re: netscape’s response (source code review)

Header Data

From: patrick@Verity.COM (Patrick Horgan)
To: gnu@toad.com
Message Hash: 1491163ec6b67bdbfbfed6175352640ee5acc1d347c8aba793592f4997b9d4a3
Message ID: <9509211732.AA18490@cantina.verity.com>
Reply To: N/A
UTC Datetime: 1995-09-21 17:36:16 UTC
Raw Date: Thu, 21 Sep 95 10:36:16 PDT

Raw message

From: patrick@Verity.COM (Patrick Horgan)
Date: Thu, 21 Sep 95 10:36:16 PDT
To: gnu@toad.com
Subject: Re: netscape's response (source code review)
Message-ID: <9509211732.AA18490@cantina.verity.com>
MIME-Version: 1.0
Content-Type: text/plain


> 
> It is becoming gradually clearer in cryptanalysis that you can't test
> security of pieces in isolation.  Their interaction with the
> surrounding code and protocols is key to their security.  Ross

I don't think this is a new realization, attacks on crpyto systems have
always considered the whole system.

   _______________________________________________________________________
  /  These opinions are mine, and not Verity's (except by coincidence;).  \
 |                                                       (\                |
 |  Patrick J. Horgan         Verity Inc.                 \\    Have       |
 |  patrick@verity.com        1550 Plymouth Street         \\  _ Sword     | 
 |  Phone : (415)960-7600     Mountain View                 \\/    Will    | 
 |  FAX   : (415)960-7750     California 94303             _/\\     Travel | 
  \___________________________________________________________\)__________/





Thread