Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread Ed Gerck

Anne  Lynn Wheeler wrote:

Ed Gerck wrote:
Regarding PKI, the X.509 idea is not just to automate the process of 
reliance but to do so without introducing vulnerabilities in the 
threat model considered in the CPS.


but that is one of the points of the article that as you automate more 
things you have to be extra careful about introducing new 
vulnerabilities 


I believe that's what I wrote above. This rather old point (known to the X.509
authors, as one can read in their documents) is why X.509 simplifies what it
provides to the least possible _to_automate_ and puts all the local and human-
based security decisions in the CPS.

(The fact that the CPS is declared to be out of scope of X.509 is both a
solution and a BIG problem as I mentioned previously.)

the issue of public key email w/o PKI ... is you have all the identical, 
same basic components that PKI also needs.


PGP is public-key email without PKI. So is IBE. And yet neither of them has
all the identical, same basic components that PKI also needs. Now, when you
look at the paper on email security at
http://email-security.net/papers/pki-pgp-ibe.htm
you see that the issue of what components PKI needs (or not) is not
relevant to the analysis.

 ... as in my oft repeated description of a crook attacking the
authoritative agency that a certification authority uses for the basis 
of its certification, and then getting a perfectly valid certificate.


What you say is not really about X.509 or PKI, it's about the CPS. If the CPS
says it restricts the cert to the assertion that the email address was timely
responsive to a random challenge when the cert was issued, then relying
on anything else (e.g., that the email address is owned or operated by an
honest person or by a person who bears a name similar to that mailbox's 
username)
is unwarranted.

Cheers,
Ed Gerck

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


[Clips] Study Finds Mass Data Breaches Not as Risky as Smaller Lapses

2005-12-09 Thread R. A. Hettinga

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Thu, 8 Dec 2005 15:59:25 -0500
 To: Philodox Clips List [EMAIL PROTECTED]
 From: R. A. Hettinga [EMAIL PROTECTED]
 Subject: [Clips] Study Finds Mass Data Breaches Not as Risky as Smaller
Lapses
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 http://online.wsj.com/article_print/SB113380595757914237.html

 The Wall Street Journal

  December 8, 2005
  FISCALLY FIT
  By TERRI CULLEN



 Study Finds Mass Data Breaches
  Not as Risky as Smaller Lapses
 December 8, 2005

 Two scenarios: a) You're notified by an online retailer that you're among
 millions of customers whose account information was lost or stolen; or b)
 you learn a former staffer has stolen employee names, addresses and Social
 Security numbers from your small business.

 Which one puts you at greater risk for identity theft?

 If you chose b, you'd be correct, according to a study released Wednesday
 by ID Analytics, a San Diego company that helps companies combat fraud
 using pattern-recognition technology. The company examined billions of bits
 of identifiable information, such as Social Security numbers, cellphone
 numbers, dates of birth and credit-card account numbers, from consumers who
 were victims of security breaches. The study analyzed four cases of
 security breaches, two involving the theft or loss of sensitive data,
 including names and Social Security numbers, and two involving credit-card
 account information only.
 SHARE YOUR THOUGHTS
  What do you think?1 Are corporate notifications of data security breaches
 necessary to prevent identity theft, or do they cause unnecessary panic?
 What should companies do to aid customers when they discover sensitive
 consumer data have been lost or stolen? Write to me at [EMAIL PROTECTED]

 Turns out size does matter: The study found that individuals involved in
 mass data security breaches are less likely to have their information
 misused than victims of smaller data breaches.

 The sheer volume of consumers affected slows identity thieves down, says
 Mike Cook, vice president of product services at ID Analytics and one of
 the company's co-founders. We applied identity theft to real work terms,
 eight-hour days, with breaks and vacation time, and found that it would
 take a fraudster 40 years to work a million stolen IDs, he says.

 Some disclosure: ID Analytics, which is in the business of detecting
 identity theft for companies such as financial-services firms and
 retailers, initiated the study at the request of the companies whose
 security breaches were examined. The companies didn't sponsor the study,
 but ID Analytics provides services to one of the breached companies and
 provided services to another of the companies in the past.

 The ID Analytics study also found that mass data security breaches didn't
 result in the identity theft free-for-all many had feared. The odds are
 less than one in 1,000 that misuse or fraud will be detected for
 individuals whose sensitive information is compromised in cases of
 large-scale security breaches.

 Identity theft was more common when there was an intentional effort to
 steal information, as opposed to security lapses that occurred by accident,
 the study found. So, for example, you're more likely to be a victim if a
 thief intentionally steals a laptop to access the sensitive consumer data
 it holds, rather than if the thief steals the laptop simply to hock it for
 cash.

 The study comes in the wake of a series of highly publicized mass security
 breaches this year, which raised concern about the potential for widespread
 identity theft. In June, for example, MasterCard International Inc.
 reported3 that someone had broken into the computer network of CardSystems
 Solutions Inc., an Atlanta company that processes credit-card transactions.
 The breach gave the thief access to names, account numbers and card
 security codes on more than 40 million credit-card accounts.

 When breaches such as this are disclosed, many consumers have no idea how
 likely it is that their information will be used to commit fraud, says Jay
 Foley, co-executive director of the Identity Theft Resource Center in San
 Diego, a nonprofit organization that assists victims of identity theft.

 What [ID Analytics] is doing is identifying quite accurately where the
 greatest potential danger is, he says. The study emphasizes the types of
 breaches [that] businesses and government need to look at closely and take
 seriously.

 What constitutes a higher-risk intentional breach? The riskiest category is
 one-on-one crimes, where a thief targets a victim to steal identification
 or account information. When information on thousands of individuals is
 stolen, however, the chances of one person in that group becoming a victim
 falls considerably, according to the study. As you pass information stolen
 on 200 people or more in one incident, the risk drops off sharply, he says.

 Consumers 

Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread James A. Donald
--
From:   Anne  Lynn Wheeler
[EMAIL PROTECTED]
 PKI is trying to offer some added value in first time
 communication between two strangers

However, the main point of attack is phishing, when an
outsider attempts to interpose himself, the man in the
middle, into an existing relationship between two people
that know and trust each other. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 FYVMooN6NmFglw4lbAf5aNMCV9JMCU/ozMfXJMgI
 4WWQ2pQAOpm3Ttro+Ga5AcJIyW4/gefQzmeVWEsPN


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread James A. Donald
--
James A. Donald:
We can, and should, compare any system with the 
attacks that are made upon it.   As a boat 
should resist every probable storm, and if it 
does not it is a bad boat, an encryption system 
should resist every real threat, and if it does 
not it is a bad encryption system.

Aram Perez
   I'm sorry James, but you can't expect a (several 
   hundred dollar) rowboat to resist the same 
   probable storm as a (million dollar) yacht.

James A. Donald:
  Software is cheaper than boats - the poorest man can 
  afford the strongest encryption, but he cannot 
  afford the strongest boat.

Aram Perez
 If it is that cheap, then why are we having this 
 discussion? Why isn't there a cheap security solution 
 that even my mother can use?

Design is not cheap, and in particular cryptographic 
design is not cheap, because one has to see what attacks 
eventuate - one commonly discovers that one's
cryptography was fine, but one's threat model was
inadequate.  But having been designed, and survived 
attack, it can then be supplied to everyone. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 J0TlTGnN72O7gpg1XX5GRDTi4nJ4wVeAa557yccN
 44MC72QwGhBFeTainKp+spi3G6oGpfuNsPZYDSpwt



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread Matthew Byng-Maddick
On Thu, Dec 08, 2005 at 09:40:22AM -0800, Aram Perez wrote:
 On Dec 7, 2005, at 10:24 PM, James A. Donald wrote:
 Aram Perez
 James A. Donald:
 We can, and should, compare any system with the
 attacks that are made upon it.   As a boat should
 resist every probable storm, and if it does not it
 is a bad boat, an encryption system should resist
 every real threat, and if it does not it is a bad
 encryption system.
 I'm sorry James, but you can't expect a (several
 hundred dollar) rowboat to resist the same probable
 storm as a (million dollar) yacht.
 Software is cheaper than boats - the poorest man can
 afford the strongest encryption, but he cannot afford
 the strongest boat.
 If it is that cheap, then why are we having this discussion? Why  
 isn't there a cheap security solution that even my mother can use?

Can your mother sail a boat? Worth noting that more expensive doesn't
necessarily make the boat easier to sail (in fact there are more things
to tune, in general), and at the point that you're getting a million
pound yacht, you'll probably be hiring someone very qualified to skipper
it for you... Is that a useful comparison then to security software? I
would expect a competent sailor to be able to weather some storms in a
rowboat, where, your mother (to use the example above) would fail. If
we carry the discussion to its logical conclusion: I'd therefore expect
someone who understands about security to be able to use available
security software with a reasonable ability to keep their data safe.

Useability and cost are not necessarily related. This discussion
is conflating both things. In the security software case, the
useability is not there yet at all, the cost is generally fine.

The question you want to be asking is what can be done to make the
available software useable safely by my mother?

Cheers

MBM

-- 
Matthew Byng-Maddick  [EMAIL PROTECTED]   http://colondot.net/
  (Please use this address to reply)

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: [Clips] Diebold insider alleges company plagued by technical woes

2005-12-09 Thread Neil Mitchison
 Does anyone here have any links to voting system designs that use
 cryptography to achieve their goals?

Have a look at www.scytl.com

Neil Mitchison



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]