On 07/28/2010 10:34 PM, d...@geer.org wrote:
The design goal for any security system is that the number of
failures is small but non-zero, i.e., N>0.  If the number of
failures is zero, there is no way to disambiguate good luck
from spending too much.  Calibration requires differing outcomes.
Regulatory compliance, on the other hand, stipulates N==0 failures
and is thus neither calibratable nor cost effective.  Whether
the cure is worse than the disease is an exercise for the reader.

another design goal for any security system might be "security proportional to 
risk". the major use of SSL in the world today is hiding financial transaction 
information ... currently mostly credit card transactions. One of the issues is that the 
value of the transaction information to the merchants (paying for majority of the 
infrastructure) is the transaction profit ... which can be a dollar or two. The value of 
the transaction information to the attackers is the associated account limit/balance, 
which can be several hundred to several thousand dollars. This results in a situation 
where the attackers can afford to outspend the defenders by 100 times or more.

somewhat because of the work on the current payment transaction infrastructure 
(involving SSL, by the small client/server startup that had invented SSL), in 
the mid-90s, we were invited to participate in the x9a10 financial standard 
working group (which had been given the requirement to preserve the integrity 
of the financial infrastructure for all retail payments). the result was the 
x9.59 financial transaction standard. Part of the x9.59 financial transaction 
standard was slightly tweaking the paradigm and eliminating the value of the 
transaction information to the attackers ... which also eliminates the major 
use of SSL in the world today. It also eliminates the motivation behind the 
majority of the skimming and data breaches in the world (attempting to obtain 
financial transaction information for use in performing fraudulent financial 
transactions). note the x9.59 didn't do anything to prevent attacks on SSL, 
skimming attacks, data breaches, etc ... it just eliminated the
major criminal financial motivation for such attacks.

--
virtualization experience starting Jan1968, online at home since Mar1970

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to