At 01:18 PM 1/27/02 -0500, you wrote:
> > Roll your own encryption. I remember awhile back some
> > posted their algorithm for encryption in CF, and it
> > seemed pretty solid. If you use your own encryption
> > scheme, it would be a lot harder for a hacker to decrypt
> > the CC number.
>
>Yikes! I'd strongly recommend against writing your own encryption
>algorithms, unless you're Bruce Schneier or the like. A good,
>publicly-examined algorithm is your best bet. There's a reason why the
>government takes so long to approve an encryption algorithm - public
>examination by experts is the best way to find flaws within the algorithm.
>
>Here's a good quote on the subject:
>http://www.counterpane.com/crypto-gram-9810.html#cipherdesign
>
> > Using a public standard (like cfencrypt) is not a
> > very good solution.
>
>The problem with CFENCRYPT isn't that it's a public standard, but rather
>that it uses a relatively weak encryption strength (that, along with the
>fact that the key is probably stored somewhere within the application code
>or environment).

Something that people need to understand about encryption is that the 
algorithm may not seem to have flaws to a novice but has huge flaws to an 
expert. My best friend specializes in cryptography. (He's a security admin 
and gives encryption lectures, although he lectures on a small scale.) 
There are many tools that can decrypt your encrypted information without 
access to the encryption or decryption scheme. If your encryption algorithm 
isn't strong enough to stand up to those publicly available decryption 
tools, encryption is not going to stop someone who has a clue about 
decryption. There are tools available that combine the other tools and you 
just plug in the information and let it do the work for you.

The best bet for storing credit cards in a database is public/private key 
encryption with the private key stored on a different computer, preferably 
behind a serious firewall. It does not matter that the encryption scheme is 
public-- it stands up to the hacking tools. The encryption can be broken, 
but it takes such a huge number of hours of computer processing that it 
makes it too expensive to be worth a hacker's time. This is really the 
issue with any encryption scheme. Any scheme can eventually be broken by a 
computer-- the question is how many hours of processing time will it take 
to break it.

Keep in mind that the hacker can submit an order first and will then have 
data to compare against in the database, making it easier to detect when 
the scheme has been broken. The worst thing you can do is underestimate how 
smart hackers really are. If they're really good and really smart, it still 
isn't worth their time to hack some encryption schemes.

Now available in a San Francisco Bay Area near you!
http://www.blivit.org/mr_urc/index.cfm
http://www.blivit.org/mr_urc/resume.cfm
______________________________________________________________________
Why Share?
  Dedicated Win 2000 Server � PIII 800 / 256 MB RAM / 40 GB HD / 20 GB MO/XFER
  Instant Activation � $99/Month � Free Setup
  http://www.pennyhost.com/redirect.cfm?adcode=coldfusionc
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to