John Ioannidis wrote:
Just don't do it. If you are going to spend your energy on anything, it should be to work against such a plan.
I would agree, but I fear that a "this is never going to work, drop it" will be less heard than any effort in at least trying to raise the bar for an attack. The previous proposed solution at the work group was that the service provider 'configured' the device with an authentication 'word' upon activation an made sure that that 'word' was always present on each message to authenticate it. The only benefit I can see in it (that could very likely been accepted if no one objected) is that is so simple that all bugs are obvious...

But I accept that the false sense of security of a complex scheme that is broken somewhere _maybe_ worse than an obviously wrong solution...

Santiago.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to