From: Robert Hettinga <rah@shipwright.com>
To: cryptography@c2.net
Message Hash: 40bb6798970020f99eb3df406c77dfb8be480e39fb6d1aad433093b984ae2929
Message ID: <v0401170bb23826311cd9@[139.167.130.248]>
Reply To: N/A
UTC Datetime: 1998-09-30 05:23:42 UTC
Raw Date: Wed, 30 Sep 1998 13:23:42 +0800
From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Sep 1998 13:23:42 +0800
To: cryptography@c2.net
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Message-ID: <v0401170bb23826311cd9@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain
--- begin forwarded text
Date: Wed, 30 Sep 1998 13:28:45 -0400
From: Richard Lethin <lethin@reservoir.com>
Organization: Reservoir Labs, Inc.
MIME-Version: 1.0
To: dcsb@ai.mit.edu
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Richard Lethin <lethin@reservoir.com>
Status: U
Return-Path: <elias@theory.lcs.mit.edu>
Received: from LCS.MIT.EDU (mintaka.lcs.mit.edu [18.26.0.36])
by deer-park.reservoir.com (8.8.5/8.8.5) with SMTP id LAA16438
for <lethin@etcons.com>; Wed, 30 Sep 1998 11:34:14 -0400 (EDT)
Received: from theory.lcs.mit.edu by MINTAKA.LCS.MIT.EDU id aa29635;
30 Sep 98 11:30 EDT
Received: from osprey.lcs.mit.edu by theory.lcs.mit.edu (5.65c/TOC-1.2S)
id AA03777; Wed, 30 Sep 98 11:29:45 EDT
From: elias@theory.lcs.mit.edu (Peter Elias)
Received: by osprey.lcs.mit.edu (5.65c/TOC-1.2C)
id AA00821; Wed, 30 Sep 98 11:29:47 EDT
Date: Wed, 30 Sep 98 11:29:47 EDT
Message-Id: <199809301529.AA00821@osprey.lcs.mit.edu>
To: eecsfaculty@eecs.mit.edu, seminars@lcs.mit.edu, ai-tech-sq@ai.mit.edu,
joanne@theory.lcs.mit.edu, sgreen@ll.mit.edu, jsweeney@draper.com,
kaths@lids.mit.edu, jc@cs.brandeis.edu, texasgal@mit.edu,
bru@media.mit.edu, arthurs@mit.edu, dougross@mit.edu,
finn@lids.mit.edu, roger@ipswitch.com
Subject: EECS Colloquium Monday Oct 5
Appended is the notice of an EECS Colloquium by Radia Perleman, on
Monday Oct. 5. Please post and/or forward as appropriate.
Peter Elias
----------------------------------------------------------------------
MIT-EECS
1998 Fall Semester
Colloquium Series
How to Misuse Good Cryptography
And Create Insecure Network Protocols
Radia Perlman
Boston Center for Networking
SUN Microsystems
ABSTRACT
A common misconception is that security flaws involve abstruse
mathematical weaknesses in cryptographic algorithms. While it is
possible to have weak cryptographic algorithms, the world does not
need insecure cryptographic systems in order to design, build, and
deploy insecure network protocols.
This talk discusses example mistakes people have made when designing
or implementing network protocols. Examples include an e-mail standard
that allowed forging of signatures, a public key scheme less secure
than a secret key scheme, a system that thought encryption implied
integrity protection, and public key chain rules that are unworkable
in practice.
October 5, 1998
4-5 pm
Edgerton Hall, 34-101 (50 Vassar St)
Refreshments at 3:45
----------------------------------------------------------------------
--- end forwarded text
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Return to September 1998
Return to “Robert Hettinga <rah@shipwright.com>”
1998-09-30 (Wed, 30 Sep 1998 13:23:42 +0800) - [Fwd: EECS Colloquium Monday Oct 5] - Robert Hettinga <rah@shipwright.com>