From: Bruce Schneier <schneier@counterpane.com>
To: Adam Shostack <rdl@MIT.EDU>
Message Hash: db4bbc4bdd7f5024c47e4ca55b11884e3271258dbbd9ac36c7f52f22fa0189c7
Message ID: <199809211030.FAA05159@mixer.visi.com>
Reply To: <Pine.BSF.3.96.980920181732.10980B-100000@pakastelohi.cypherpunks.to>
UTC Datetime: 1998-09-20 21:28:19 UTC
Raw Date: Mon, 21 Sep 1998 05:28:19 +0800
From: Bruce Schneier <schneier@counterpane.com>
Date: Mon, 21 Sep 1998 05:28:19 +0800
To: Adam Shostack <rdl@MIT.EDU>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.BSF.3.96.980920181732.10980B-100000@pakastelohi.cypherpunks.to>
Message-ID: <199809211030.FAA05159@mixer.visi.com>
MIME-Version: 1.0
Content-Type: text/plain
At 06:27 AM 9/21/98 -0400, Adam Shostack wrote:
>On Sun, Sep 20, 1998 at 06:45:06PM +0200, Lucky Green wrote:
>| On Sat, 19 Sep 1998, Ryan Lackey wrote:
>|
>| >
>| > [from a discussion of tamper-resistant hardware for payment systems
>| > on dbs@philodox.com, a mailing list dedicated to digital bearer systems,
>
>| o ArcotSignTM technology is a breakthrough that offers smart card tamper
>| resistance in software. Arcot is unique in this regard, and WebFort is the
>| only software-only web access control solution on the market that offers
>| smart card security, with software convenience and cost. [We have now
>| entered deep snake oil territory. Claims that software affords tamper
>| resistance comparable to hardware tokens are either based in dishonesty or
>| levels of incompetence in league with "just as secure pseudo-ontime
>| pads"].
>|
>| In summary, based on the technical information provided by Arcot System,
>| the product is a software based authentication system using software based
>| client certificates.
>
> I have no knowledge of Arcot's systems and can't comment on
>them. Hoever, there are ways to make software hard o disassmeble
>and/or tamper with. Given that Arcot is probably going to attack
>smartcards as being easily attacked, 'smartcard level' security is not
>that high a target, the claim may not be so outlandish.
They're not looking to do tamperproof software. Their business model can
be best described as: "better than passwords, cheaper than SecurID."
Here's the basic idea: Strew a million passwords on your hard drive, and
make it impossible to verify which is the correct one offline. So, someone
who steals the password file off the client cannot run a cracking tool
against the file.
> Be intestesting to see how fast the code is. If they're
>embedding certs in complex code that needs to run to sign, then theft
>of the cert may be difficult.
It isn't bad.
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
Free crypto newsletter. See: http://www.counterpane.com
Return to September 1998
Return to ““Todd S. Glassey” <TSGman@earthlink.net>”