Re: Columbia crypto box

2003-02-10 Thread Adam Fields
On Sun, Feb 09, 2003 at 11:34:01PM -0500, Steven M. Bellovin wrote:
 First, there was no key management.  This means that loss of a single 
 unit -- a stolen laptop or a disgruntled (ex-)employee would do -- 
 compromises the entire network, since it's impossible to rekey 
 everything at once in an organization of any size.  For most real-world 
 deployments, this is the most serious weakness.  Furthermore, if there 
 were real key management, the next two problems couldn't have happened.
 This was clearly avoidable.

Practically, what's the right way to do this? You could do it with a
centralized server key that has the ability to broadcast a new shared
key to all clients, but then if the server gets compromised you lose
control of the entire network (possibly true anyway, for different
reasons).

From my personal (limited) experience, key management is really
hard. I'm curious about potential solutions to this.

-- 
- Adam

-
Adam Fields, Managing Partner, [EMAIL PROTECTED]
Surgam, Inc. is a technology consulting firm with strong background in
delivering scalable and robust enterprise web and IT applications.
http://www.adamfields.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Columbia crypto box

2003-02-08 Thread Adam Fields
On Sat, Feb 08, 2003 at 01:24:14PM -0500, Tim Dierks wrote:
 There may be more valid reasons for treating the device as secret; some 
 categories that come to mind include protecting non-cryptographic 
 information, such as the capabilities of the communication channel. Also, 
 many systems on the shuttle are obsolete by modern standards, and it's 
 possible that the communications security is similarly aged.

Isn't it also possible that the device contains a physical key of some
kind?

-- 
- Adam

-
Adam Fields, Managing Partner, [EMAIL PROTECTED]
Surgam, Inc. is a technology consulting firm with strong background in
delivering scalable and robust enterprise web and IT applications.
http://www.adamfields.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Linux-style kernel PRNGs and the FIPS140-2 test

2002-01-15 Thread Adam Fields


Thor Lancelot Simon says:
 Many operating systems use Linux-style (environmental noise
 stirred with a hash function) generators to provide random
 and pseudorandom data on /dev/random and /dev/urandom
 respectively.  A few modify the general Linux design by adding an
 output buffer which is not stirred so that bits which have already
 been output are not stirred into the pool of new random data
 (IMO, not doing this is insane, but that's a different subject).
[...]

Does the above description also apply to truerand, or is that subtly
different?
- Adam

-
Surgam, Inc. is a technology consulting firm with strong background in
delivering robust and scalable enterprise web and IT applications.
http://www.surgam.net



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Linux-style kernel PRNGs and the FIPS140-2 test

2002-01-15 Thread Adam Fields


Arnold G. Reinhold says:
 This result would seem to raise questions about SHA1 and MD5 as much 
 as about the quality of /dev/random and /dev/urandom.  Naively, it 
 should be difficult to create input to these hash functions that 
 cause their output to fail any statistical test.

I would think that this would only be relevant if there was a
correlation between inputs and outputs. Lack of entropic skew across
the bits of the output shouldn't give any clues to the specific input,
unless the outputs are clumping across the output
space. Theoretically, the hash functions ought to be able to output
every bit string in the output space, so you'd realistically expect a
fair number of runs.

You're right - it should be difficult to create inputs to the hash
functions that cause their output to fail a distribution test, but
doing so casts doubt on the randomness of the inputs, not the
distribution space of the hash.

At least I think that's right - it's been a while since I've thought
about this.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



What does it take to be a security professional?

2001-11-09 Thread Adam Fields

I make my living as a technical consultant, doing architecture and
programming for mid-to-large-scale enterprise information processing
systems (mostly content management infrastructures lately). I have a
formal CS education, and I consider myself about as knowledgable an
amateur as possible on the subjects of computer security and crypto.

So, I ask the following question - what does it take to be a security
professional?. What should I learn in order to be able to confidently
offer security services to my clients? I'm looking for journals,
readings, certifications, broad topics... the works.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Hijackers' e-mails were unencrypted

2001-10-03 Thread Adam Fields


[EMAIL PROTECTED] says:
 I can just see it coming --
 
 their email was in the clear and we still coudln't find them; imagine
 how much harder it will be when everybody uses cryptography.
 
 I don't think we can win either way.

Of course, when everybody uses state-sanctioned security, the protocol
will automatically forward a suspicion digest index to the
appropriate authorities, allowing for easy sifting and sorting by
threat level.

- Adam

-
Surgam, Inc. is a technology consulting firm with strong background in
delivering enterprise web and IT applications for Global 2000 clients.
http://www.surgam.net



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]