Remember - did at least 3 of these, 20 years ago. :)
Still true - still valid - still good advice.
I avoid the scratching, but maybe also this helps.
--Michael


Am 27.09.2013 um 14:47 schrieb John Young <[email protected]>:

> There was a time when non-official crypto wizards recommended:
> 
> From best to worst:
> 
> 1. Roll your own, keep it quiet, change it often, monetize as a
> last resort before a cheated partner cuts your throat.
> 
> 2. Avoid commercial giants most inevitably in bed with officials
> to screw users mercilessly laughing on the way to SWIFT.
> 
> 3. Avoid products of the most powerful nations and their satellites
> and gangsters bypassing export controls in service to those
> very nations' covert armaments-economic policies.
> 
> 4. Avoid any widely touted, admired, promoted as the best due
> to long history of dupery by this magic bullet.
> 
> 5. Use off-market, black market, deep web, blacknet, onionized,
> layered, piggy-backed, scatalogically provened reliable based
> on total avoidance of the many hegemons working the cypto
> fleece terrain, expect to be reamed, dosed and sausaged.
> 
> 6. Go back to No. 1, repeat, daily, hourly, minutely, pause,
> wonder is this nuts, pound delete, backspace, esc, ctrl-alt-del,
> smash the EENT device.
> 
> 7. Pick nose, ear, tooth, scratch crotch, hmm, scratch some
> more, log onto revenge porn, spot your ex-partner leaking
> your perfect privacy prophylactic.
> 
> At 08:09 AM 9/27/2013, you wrote:
>> ----- Forwarded message from Jerry Leichter <[email protected]> -----
>> 
>> Date: Wed, 25 Sep 2013 14:12:25 -0400
>> From: Jerry Leichter <[email protected]>
>> To: ianG <[email protected]>
>> Cc: [email protected]
>> Subject: Re: [Cryptography] RSA recommends against use of its own products.
>> X-Mailer: Apple Mail (2.1510)
>> 
>> On Sep 25, 2013, at 12:31 PM, ianG <[email protected]> wrote:
>> 
>> > Hi Jerry,
>> >
>> > I appreciate the devil's advocate approach here, it has helped to get my 
>> > thoughts in order!  Thanks!
>> :-)
>> 
>> > My conclusion is:  avoid all USA, Inc, providers of cryptographic products.
>> In favor off ... who?
>> 
>> We already know that GCHQ is at least as heavily into this monitoring 
>> business as NSA, so British providers are out.  The French have been playing 
>> the "oh, we're shocked, shocked that there's spying going on" game - but 
>> they have a long history of their own.  It's been reported for many years 
>> that all Air France seats are bugged by the French security services and the 
>> information recorded has been used to help French economic interests.  And 
>> even if you don't think a particular security service has been going after 
>> in-country suppliers, recall decades of US spiking of the Swiss Crypto AG 
>> machines.
>> 
>> It's a really, really difficult problem.  For deterministic algorithms, in 
>> principle, you can sandbox the implementation (both physically and in 
>> software) and compare inputs and outputs to a specification.  That leaves 
>> you to worry about (a) holes in the specification itself; (b) physical 
>> leakage of extra information (Tempest-like).  Both of these can be dealt 
>> with and you can gain any degree of assurance you consider necessary, at 
>> least in principle.  Sure, someone can spike your hardware - but if it only 
>> does what the spec says it's supposed to do, what does that gain them?  
>> (Storing some of your secrets within the sandboxed system does them no good 
>> if they can't get the information out.  Of course, physical security is 
>> essential, or your attacker will just walk the system, with all its 
>> contained information, out the door!)
>> 
>> For probabilistic algorithms - choosing a random number is, of course, the 
>> simplest example - it's much, much harder.  You're pretty much forced to 
>> rely on some mathematics and other analysis - testing can't help you much.
>> 
>> There are really no absolutes; you really have to think about who you want 
>> to protect yourself from and how much you are willing to spend, because 
>> there's no limit on how much you *could* do.  Build your own foundry?  
>> Create your own circuit synthesis code?  You very quickly get yourself into 
>> a domain where only a handful of companies or countries can even begin to go.
>> 
>> My take on this:  I don't much worry about attacks against general-purpose 
>> hardware.  The difficulty of modifying a processor so that you can tell when 
>> it's implementing a cipher and then do something useful about it seems 
>> insurmountable.  The exception is when the hardware actually gets into the 
>> crypto game - e.g., the Intel AES extensions and the random number 
>> generator.  If you're going to use these, you need to do so in a way that's 
>> secure even if those features are spiked - e.g., use the random number 
>> generator only as one of a couple of sources.
>> 
>> Still, *much* more worrisome are the badly implemented, insecure extensions 
>> to allow remote control of the hardware, which are being discussed in a 
>> separate thread here.  These are really scary - there's no protection 
>> against an attacker who can send a magic packet to your network interface 
>> and execute code with full privileges.
>> 
>> Code, at least for symmetric cryptography primitives and modes, is simple 
>> enough that you can find it all over the place.  Realistically, the worst 
>> attacks against implementations these days are timing attacks.  Bernstein's 
>> ciphers have the advantage of being inherently secure against these, showing 
>> that this is possible (even if you don't necessarily trust his particular 
>> constructions).
>> 
>> Denker's ideas about how to get random numbers whose safety is based on 
>> physical principles are great.  You do have to be careful of the hardware 
>> and software you use, but since the hardware is designed for entirely 
>> different purposes (A/D sound converters) it's unlikely anyone has, or 
>> really could, spike them all.
>> 
>> It's the asymmetric algorithms and implementations that seem to be the most 
>> vulnerable.  They are complex and difficult to get right, much less to get 
>> both efficient *and* right, and protocols that use them generally need to be 
>> probabilistic - so "black box testing" isn't feasible.  At the same time, 
>> they have rich mathematical structures in which we know things can be 
>> hidden.  (In the symmetric case, the algorithms are generally have little 
>> mathematical structure, and we *assume* nothing can be hidden in there - but 
>> who can really say with absolute confidence.)  I had a long debate here 
>> earlier on this subject, and my own conclusions remain:  Use symmetric 
>> crypto as little as you possibly can.  (What would be really, really nice is 
>> something like DH key exchange without all the mathematical structure.)
>> 
>>                                                        -- Jerry
>> 
>> _______________________________________________
>> The cryptography mailing list
>> [email protected]
>> http://www.metzdowd.com/mailman/listinfo/cryptography
>> 
>> ----- End forwarded message -----
>> --
>> Eugen* Leitl <a href="http://leitl.org";>leitl</a> http://leitl.org
>> ______________________________________________________________
>> ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
>> AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
> 
> 

Reply via email to