--
At 09:59 AM 8/31/2000 -0700, Michael Thomas wrote:
 > It looks like your argument is not with the SIP WG but with the CAT
 > WG.

To be useful, encryption must be integral with a communications 
protocol.  To be secure, a communications protocol must be integral with 
encryption.

 > I'm sure a lot of folks there would be willing to entertain (or not)
 > this argument. In particular, the assertion that that Kerberos is
 > inherently subject to dictionary attacks looks more like an
 > indictment against symmetric key cryptography in general, rather
 > than Kerberos in particular.

There is nothing special about symmetric key cryptography that makes it 
particularly subject to dictionary attacks.  In all public key solutions, 
the public keys are used to set up a symmetric key that is not subject to 
dictionary attacks.

It is probably possible to set up a system with properties similar to those 
that I outlined using nothing but symmetric key cryptography, though it 
would be more complex, hence harder to understand and harder to get right.

Existing symmetric key solutions (Kerberos) are vulnerable to dictionary attack

Existing public key solutions are hard to use and unpopular.

These are properties of the particular implementations, and the particular 
tasks for which they are used, not a property of the underlying 
technology.   The technology is merely a tool.  It is what one makes with 
the tool that has particular properties, like being hard to use, or being 
vulnerable to particular attacks


     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      xirSvfQvSQVFCs8dj58C5bSdC21fv2EaGyNzr8wn
      4x8kyGomth1BRtbAUDUQHnw3q8MGtTv7Mb395WWQ4

Reply via email to