On 27 March 2013 17:20, Steven Bellovin <[email protected]> wrote:
> On Mar 27, 2013, at 3:50 AM, Jeffrey Walton <[email protected]> wrote:
>
>> What is the reason for checksumming symmetric keys in ciphers like BATON?
>>
>> Are symmetric keys distributed with the checksum acting as a
>> authentication tag? Are symmetric keys pre-tested for resilience
>> against, for example, chosen ciphertext and related key attacks?
>>
> The parity bits in DES were explicitly intended to guard against
> ordinary transmission and memory errors.  Note, though, that this
> was in 1976, when such precautions were common.  DES was intended
> to be implemented in dedicated hardware, so a communications path
> was needed, and hence error-checking was a really good idea.

And in those days they hadn't quite wrapped their heads around the
concept of layering?

That said, I used to work for a guy with a long history in comms. His
take was that the designers of each layer didn't trust the designers
of the layer below, so they added in their own error correction.

Having seen how crypto has failed lately, perhaps we should have more
of the same distrust!
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to