1998-09-30 - [Fwd: EECS Colloquium Monday Oct 5]

Header Data

From: Robert Hettinga <rah@shipwright.com>
To: cryptography@c2.net
Message Hash: 40bb6798970020f99eb3df406c77dfb8be480e39fb6d1aad433093b984ae2929
Message ID: <v0401170bb23826311cd9@[139.167.130.248]>
Reply To: N/A
UTC Datetime: 1998-09-30 05:23:42 UTC
Raw Date: Wed, 30 Sep 1998 13:23:42 +0800

Raw message

From: Robert Hettinga <rah@shipwright.com>
Date: Wed, 30 Sep 1998 13:23:42 +0800
To: cryptography@c2.net
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Message-ID: <v0401170bb23826311cd9@[139.167.130.248]>
MIME-Version: 1.0
Content-Type: text/plain




--- begin forwarded text


Date: Wed, 30 Sep 1998 13:28:45 -0400
From: Richard Lethin <lethin@reservoir.com>
Organization: Reservoir Labs, Inc.
MIME-Version: 1.0
To: dcsb@ai.mit.edu
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Sender: bounce-dcsb@ai.mit.edu
Precedence: bulk
Reply-To: Richard Lethin <lethin@reservoir.com>
Status: U



Return-Path: <elias@theory.lcs.mit.edu>
Received: from LCS.MIT.EDU (mintaka.lcs.mit.edu [18.26.0.36])
	by deer-park.reservoir.com (8.8.5/8.8.5) with SMTP id LAA16438
	for <lethin@etcons.com>; Wed, 30 Sep 1998 11:34:14 -0400 (EDT)
Received: from theory.lcs.mit.edu by MINTAKA.LCS.MIT.EDU id aa29635;
          30 Sep 98 11:30 EDT
Received: from osprey.lcs.mit.edu by theory.lcs.mit.edu (5.65c/TOC-1.2S)
	id AA03777; Wed, 30 Sep 98 11:29:45 EDT
From: elias@theory.lcs.mit.edu (Peter Elias)
Received: by osprey.lcs.mit.edu (5.65c/TOC-1.2C)
	id AA00821; Wed, 30 Sep 98 11:29:47 EDT
Date: Wed, 30 Sep 98 11:29:47 EDT
Message-Id: <199809301529.AA00821@osprey.lcs.mit.edu>
To: eecsfaculty@eecs.mit.edu, seminars@lcs.mit.edu, ai-tech-sq@ai.mit.edu,
        joanne@theory.lcs.mit.edu, sgreen@ll.mit.edu, jsweeney@draper.com,
        kaths@lids.mit.edu, jc@cs.brandeis.edu, texasgal@mit.edu,
        bru@media.mit.edu, arthurs@mit.edu, dougross@mit.edu,
        finn@lids.mit.edu, roger@ipswitch.com
Subject: EECS Colloquium Monday Oct 5


Appended is the notice of an EECS Colloquium by Radia Perleman, on
Monday Oct. 5.  Please post and/or forward as appropriate.

Peter Elias
----------------------------------------------------------------------

			     MIT-EECS
			1998 Fall Semester
			 Colloquium Series


	       	  How to Misuse Good Cryptography
	       And Create Insecure Network Protocols

			  Radia Perlman
		  Boston Center for Networking
			SUN Microsystems



			     ABSTRACT


A common misconception is that security flaws involve abstruse
mathematical weaknesses in cryptographic algorithms. While it is
possible to have weak cryptographic algorithms, the world does not
need insecure cryptographic systems in order to design, build, and
deploy insecure network protocols.

This talk discusses example mistakes people have made when designing
or implementing network protocols. Examples include an e-mail standard
that allowed forging of signatures, a public key scheme less secure
than a secret key scheme, a system that thought encryption implied
integrity protection, and public key chain rules that are unworkable
in practice.


		          October 5, 1998
			        4-5 pm
		 Edgerton Hall, 34-101 (50 Vassar St)
		         Refreshments at 3:45


----------------------------------------------------------------------

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





Thread