RE: Intel plans crypto-walled-garden for x86

2010-09-15 Thread ian.farquhar
I'd call this news announcement about Intel creating a run known good code 
facility about as credible as the joke that Otellini told his minions to go 
buy a copy of McAfee, and they didn't hear the copy of part.

Noone will tolerate an Intel-moderated walled garden.  Only Apple has customers 
with a bad enough case of stockholm syndrome to tolerate that sort of nonsense.

Ian.

-Original Message-
From: owner-cryptogra...@metzdowd.com on behalf of Peter Gutmann
Sent: Wed 15-Sep-10 2:03 AM
To: cryptography@metzdowd.com; g...@toad.com
Subject: Re: Intel plans crypto-walled-garden for x86
 
John Gilmore g...@toad.com writes:

Let me guess -- to run anything but Windows, you'll soon have to jailbreak
even laptops and desktop PC's?

Naah, we're perfectly safe, like every other similar attempt after 5-10 years
of effort and several hundred million dollars down the drain it'll come to
nothing.  I guess that's one silver lining of the corollary to We can't
secure PCs against the bad guys, which is We can't 'secure' them against
their owners either (with the rider ... although we can cause a lot of cost
and inconvenience in trying).

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


RE: non 2048-bit keys

2010-08-16 Thread ian.farquhar
Samuel Neves wrote:

 If an attacker creating a special-purpose machine to break your keys is
 a realistic scenario, why are you even considering keys of that size?

What's the threat model?

If the set of possible actors includes first world SIGINT agencies, then yes, 
it is a reasonable assumption that a special configuration of system has been 
created to factor keys.  Think IBM or pre-acquisition SGI or pre-acquisition 
Sun as a supplier of such hardware, scaled up way beyond the configurations 
you'd get in the marketing literature (tens of thousands of cores, terabytes of 
physical RAM, low-range nine-figure price tags).

But as such an attack would likely cost millions of dollars per key, because 
the time to solution would be weeks or even months, then they'll only be using 
it as a last resort.  As Peter correctly pointed out, there are so many other 
viable threat vectors which are available, especially human-in-the-loop ones, 
which would likely be exhausted before that solution was tried.

For non-government level attacks, I agree that such a scenario is unrealistic.

Ian.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


RE: Destroying confidential information from database

2009-04-30 Thread ian.farquhar
 What I don't know is how to securely erase information from a
database.

 I cannot assume that the vendor solves this matter, anyone have a
clue?

I'd say your assumption is valid.  This is not to disrespect the
database vendors, but to point out that their risk modelling is
generally significantly looser than that which would be accepted by
someone who worries about secure data erasure on storage media.

I'd strongly suggest erasing the disk on which the database is stored,
using whatever mechanism meets your security needs (ie. From a DoD
secure erase right up to the full physical destruction of the media).

Also consider erasure of any areas of the disk where data might have
been cached, including but not limited to working tables and swap.

Ian.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


RE: Obama's secure PDA

2009-01-29 Thread ian.farquhar
Perry wrote:
pgut...@cs.auckland.ac.nz (Peter Gutmann) writes:
 I wonder what a classified USB cable is.  Perhaps it's an
unclassified USB
 cable with the little three-prong USB logo blacked out by the
censors.

 I would imagine it is a tempest shielded cable, and appropriately
 altered connectors.

It would definitely be shielded, but I doubt it's TEMPEST qualified at
that price point.

I suspect it's just a USB cable with a keyed connector, to enforce
red/black sep in this somewhat atypical environment (eg. section
5.4.6.1.1.2 of MIL-HDBK-232A)

Ian.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com