Crypto Snake Oil 215
An anonymous reader writes "Luther Martin of Voltage Security has published an article about the perception of cryptography today with regards to quality and honesty in vendors. From the article: 'Products that implement cryptography are probably credence goods. It requires expensive and uncommon skills to verify that data is really being protected by the use of cryptography, and most people cannot easily distinguish between very weak and very strong cryptography. Even after you use cryptography, you are never quite sure that it is protecting you like it is supposed to do.'"
Snake Oil (Score:5, Informative)
'nuff said
Re: (Score:2, Insightful)
Like a religion?!
Re: (Score:2)
Put it this way -- praying to, say, the TrueCrypt gods seems about as effective as praying to your own God.
But you and I are considerably more offtopic, anyway. If you'd like, we can take this to another forum. I am not anti-religion, but if you are offended by statements like "religion is superstitio
Article taken from Wikipedia??? (Score:3, Interesting)
http://en.wikipedia.org/wiki/Snake_oil [wikipedia.org]
Not trying to troll, I just couldn't figure out which it was and I don't have a lot of time to investigate.
Transporter_ii
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Still not too bad (Score:4, Interesting)
Re:Still not too bad (Score:5, Interesting)
Take WEP for example. I personally wouldn't know how to crack it. But others do. They develop tools. Et voila, today it's trivial to download some tool and break WEP, even for novices.
Weak encryption is never good and should be strongly discouraged.
Re:Still not too bad (Score:5, Insightful)
In that case, WEP really does work for most people.
Re: (Score:3, Insightful)
In the amount of time it takes to walk to the nearest open WAP, you probably couldn't grab enough packets to break WEP.
But if your intentions are, ohh I don't know.. say DARKER. Then yes, WEP is not going to protect the target of your GRISLY, ABYSMAL ABOMINATION of h4x0ring.
I leave my WAP open.. because it reminds me that no communication is secure unless I MAKE it secure. I don't rely on the router or anything else
Re: (Score:2)
In other words, I keep the security of my wireless always just a tiny bit tighter than that of my neighbour; making sure that
Re:Still not too bad (Score:4, Informative)
Because WPA is inconvenient when you're using a device that doesn't support it.
WPA-supporting devices all but mandatory (Score:2, Informative)
WPA-supporting devices are all but mandatory for laptops and WAPs these days. If your device doesn't support WPA, replace it.
These WEP is little more than a "no tresspassing" sign - it will keep people from accidently connecting to your WLAN, but not much else.
Re: (Score:2)
I would also suggest tha
Re:Still not too bad (Score:5, Interesting)
Plus, if there is *no* encryption, people are less likely to put sensitive information in the application.
To use an analogy, consider two locker rooms. Room A does not have locks on any of the lockers. Room B has locks, but all of them have the same combination. In which one is a person more likely to leave their wallet?
Re: (Score:3, Funny)
Re:Still not too bad (Score:4, Insightful)
Re: (Score:3, Insightful)
I take it you're implying the correct answer would then be "Neither". And I'd agree.
Problem is, it's not a relevant point. The context here is consumer's ignorance on the performance of crypto products. If someone is buying a crypto product, they must have determined that they need one. Or to co
Re: (Score:2, Funny)
Put the wallet in your sneaker. I put it down by the toe, they never look there!
You'd have thought so... (Score:5, Informative)
Ok, I'll be fair - though God alone knows why, and I think even God gave up trying to figure out the tangled mess I call a brain some time ago. They did use DES - not triple DES, just plain DES - for the really really sensitive stuff. The encryption key was visible to anyone logged in on any account, however, as the DES they used required the key to be the first parameter and they made no effort to erase it. So it was technically encrypted. (Once the passkey has been broadcast to all and sundry, I do not regard the encryption as anything more than a technicality, and in the case of DES, I seriously doubt you could even claim that.)
I've heard that security has since improved. I say "heard", because it was some time AFTER security was said to have been improved that reports started coming out of a fileswapper using NASA storage machines as extra disk space - the very same organization and very same type of mass storage device I had serious doubts about many years prior to that.
But that's a Government institution! Yes, and they're the ones with a great many experts in such matters and a great many contracts with people who can not merely withdraw business but also guarantee a disaster in the next election. The bulk of private corporations out there have neither the skills to draw on OR the incentives to maintain some sort of standard. All they have to do is ROT13 and tell you it's got digital security. Enough suckers'll buy into it to keep the CEO in champaign, caviar and girls of commercially-negotiable virtue for life.
The problem is, there is no mandated minimum standard for security, so those who can WILL use the lowest standard possible that will deceive customers into thinking they're safe whilst staying a gnat's whisker (after being compressed by the forces of a neutron star) beyond what could be sued for in courts, assuming a technically ignorant judge.
IMHO, "snake oil" could be vastly reduced - not eliminated but reduced - by placing minimum standards for crypto, compression and other easily-manipulated areas of technology, and enforcing them. Not maximum - that's what the intelligence services want, and they want it to be zero. I'm strictly talking minimum. Your good, old-fashioned lemon law - does it fill the purpose for which it was sold to the customer? Yes or no.
In the case of cryptography, that would be rephrased as follows: would a reasonable person, aware of the strengths and deficits of the technique concerned, aware of any warnings published on the block crypto lounge, hashing function lounge, etc, aware of the Usenet Crypto FAQ (ie: aware of the "common knowledge" that exists on cryptography), and aware of the grade of security the user is demonstrably expecting, agree or disagree that the cryptographic system sold meets the grade expected or not?
If it does not, it is a lemon for the purpose for which it was sold. It might be perfectly good otherwise, but it doesn't, can't, and never will do what was expected of it.
This would be enforceable, as I said very clearly that I'm talking about weighing the "common knowledge" against the "personal expectation". Both are easy to define and even a non-expert should understand a skull-and-crossbones labelled "BROKEN, DO NOT USE" in a crypto lounge. They might not understand the fine nit-picking or the advanced maths, but that's why I'm sticking solely to what is commonly known and understood, not what is derivable from axiom 327 as applies to lemma 291 as described by Professor Branestawm's obscure paper entitled "techniques for splicing dormice genes into giraffe brai
Re: (Score:3, Insightful)
And I'll bring my own lock.
Re:Still not too bad (Score:5, Interesting)
The cheaper the software is, the greater the number of people who could have peer-reviewed it for correctness. The more open the software, likewise.
Really expensive software could only have been peer-reviewed by a small number of people, while free, open source software could have been reviewed by a huge number of people.
I recently was asked to recommend a way for my CEO and several other executives to securie thier IMs. I recommended gaim + gaim-encryption because it was all open source and free, so if there were a flaw in the crypto implementation, it would likely have been discovered already.
I also made sure the CEO knew that he was using open source software, and I told him why. He was totally down with it
Re: (Score:2, Insightful)
odds still better than closed-source (Score:2, Insightful)
The best thing about open-source is that if it's a real concern to you, you can hire your own experts to check out the implimentation. You don
Re: (Score:2)
Re: (Score:2, Informative)
If you want security, ask an authority on the matter rather than basing it on inderect things like price, openness, etc.
Re: (Score:2)
Re: (Score:3, Informative)
Yes, "it could be" that many unlikely things are true. But they are still unlikely.
Are you new to cryptogology? It seems you are unfamiliar with the fundamental tenet of cryptography: "If lots of smart people have failed to solve a problem, then it probably will not be solved anytime soon."
You seem to think peer review doesn't have much to do with cryptography, but I would argue that it
Re: (Score:2)
Of course, the authority's opinion on the product might be mistaken also. What we really need is a way for laypeople to test a program's security themselves.... some sort of auto-hacker-in-a-box software, perhaps. I have no idea if that's even remotely feasible, but it would be really useful.
Re: (Score:2, Interesting)
Re: (Score:3, Informative)
OTR might be a better choice for social communications, as explained in the paper, but that does not make gaim-encryption (or PGP, etc) weak. For its intended purpose both PGP and gaim-encryption seem strong.
If I wanted to authenticate and keep a message secret from eavesdroppers, I would have no problems using gaim-encryption. At work, non-repudiation is really not a problem, and if my key was compromised, IM compromise would be my smallest problem (assu
Re: (Score:2)
It sounds like we are mostly in agreement.
I can't disagree with what you are saying. But when evaluating products, I have no way of knowing for sure "if the vendor prioritized secrity and spent money."
Re: (Score:2)
If you don't think, you'll agree that weak crypto is better than none crypto. The problem is if you believe
Re: (Score:2, Informative)
Cracking PGP is still a Hard Problem, but the times they are a'changin'. It may succumb to quantum computing. Or, it may fall under the combined assault of the army of mathematicians who are studying integer factorization. Nobody knows for sure, but the NSA has been telling people for years now to not rely on RSA. They suggest switching over to Elliptic Curve or other advanced algorithm.
Please cite that claim (Score:2)
Provide a cite for that, please?
I don't personally feel very kindly disposed towards RSA - I don't see any advantage it has over Rabin-based schemes and important disadvantages - but I think it is scaremongering to say that the NSA have been warning people about it.
Then use OSS!! (Score:4, Insightful)
It is also much easier to verify strength by reading the source rather than by reading the binary or by cryptanalysis.
or (Score:4, Interesting)
Any vendor that relies on a custom algorithm for their encryption technology shouldn't be trusted.
Re:or (Score:5, Interesting)
But even then there are vendors who claim to be using AES and end up introducing implementational flaws that are not obvious to the user. It's not just algorithms that need to be reviewed but complete implementations.
Nice read: http://www.schneier.com/crypto-gram-9902.html#sna
Re: (Score:3, Interesting)
Just because the algorithm is widely tested and known to be secure doesn't make the software based on it secure. It's very easy to take a secure algorithm like AES and make a totally insecure program by, for example, not encrypting all of the data it should, or by selecting the encryption key poorly so that it's easy to "guess",meaning you might only have to check 2^20 keys to decrypt that email of yours
Re: (Score:3, Informative)
"Even after you use cryptography, you are never quite sure that it is protecting you like it is supposed to do."
If it claims to use AES, does it really? Even if it actually does, are you sure it doesn't conveniently store the key somewhere? Even if it doesn't do anything this stupid, are you s
Re: (Score:2)
See Peter Gutmann's analysis of open source VPNs [auckland.ac.nz] back in 2003. To be sure, the situation was not as dire as he described it to be in all these cases -- in some cases such issues were arguably not readily exploitable or were documented as recognized tradeoffs -- but it nonetheless raises a point that even having a substantial group of folks looking at the source doesn't necessarily help as much as it generally does if recognizing the bugs requires special knowled
Re: (Score:2, Funny)
That has the following great suggestion:
Crypto is scary stuff (Score:4, Interesting)
Blasphemy #1: I've heard from a claimed friend of one of the inventors of RSA that it was cracked it years ago. Yet, it continues to get worldwide use. Sure my friend was probably full of it... but who am I suppose to trust here? The government?
Blasphemy #2: One of my close friend's mother had to switch fields from Numerics after she published some papers considered too sensitive. It had something to do with factoring.
Blasphemy #3: Anybody else notice that quantum computers have been proven to be capable of factoring really well, but no one has shown that they can solve any NP-hard algorithms? Come on... factoring isn't NP hard.
Then, there's just some silly stuff I've noticed about crypto. Why do we always seem to use encryption just a generation or so ahead of what is needed to crack it? SHA-1 for example... And, why do we encrypt one small block at a time. Each encrypted file usually gives many independent chances to crack the key, and in many cases, some of those blocks have known data. Also, public key is great, but secret key can be easily shown NP-hard to crack (in terms of secret key length) with semi-reasonable assumptions, while public key has no such simple proof. I personally have been trying to prove that no public key system can be NP-hard, but what the heck... I'm not that good. However, I do believe it's probably true.
It seems any time you start talking about crypto, you get assailed by experts telling you just how full of it you are. Consider something simple, like generation of random numbers. Just claiming you can do a good job brings nay-sayers out of the woodwork. See:
http://linux.slashdot.org/comments.pl?sid=193904&
http://www.billrocks.org/rng [billrocks.org]
for how to do it well. Any child could do it (well at least my geeky 6-year-old).
Everything about crypto is scary... Are we being manipulated into using weak encryption? Is there some invisible line, which if crossed, bad things can happen? The scary part is the unknown.
--
Just because your paranoid doesn't mean the world isn't out to get you.
Re: (Score:3, Interesting)
That's exactly what it is, I think. Crypto is so complex that, unless you are absolutely sure wtf you're doing, you're better off NOT trying to implement your own crypto algorithm, random number generator and whatnot. Without the mathematical knowledge, you can never completely assess side effects, for example.
A nice page about how novice understandig of crypto can turn into horribly insecure software: http [auckland.ac.nz]
Re:Crypto is scary stuff (Score:5, Interesting)
Approximatly every 12.5 minutes someone turns up claiming to have invented a new:
Random number generator
Unbreakable encryption method
Implimentation of old methods that makes them unbreakable
Proof that shows that all crypto is worthless
The percentage of loons is *so* high that anyone who does have an interesting idea (and who doesn't publish in reputable journals) is dismissed out of hand.
For example, here is a typical conversation from the one sane new poster (posted somewhere between the 999,999 people trying to sell "200000 bit quantum crypto based on the randomness of STARS!!!!!"):
<i>** Hi, I'd like to find out if there's a RNG sandbox somewhere so I can play about with some ideas.</i>
<i>* ARGH! Dont impliment your own RNG! It'll be crap! Here, use product X.</i>
Well, yes, that's true. When it comes to crypto there is a 99% chance that what you impliment will not work properly and as a result will be insecure... but stoping on someone who wants to try some ideas out is just plain wrong. All research doesnt have to take place in academic institutions.
Re: (Score:2)
All research doesn't have to take place in academic institutions, but people who claim revolutionary results should be expected to have a decent background in the field.
What would you expect to happen if I showed up in sci.physics.catapults and said:
Government incompetance is scary stuff (Score:2)
Considering that an agency that thinks polygraphs give absolutely perfect proof of lies is enforcing this sort of stuff - yes we are being manipulated into weak encryption by a bunch of incompetant clowns that have already been taken in by snake oil and are seen internationally as bumbling fools. US intelligence doesn't rate as highly as newspaper articles these days. A
Re: (Score:3, Insightful)
I've heard from a claimed friend of one of the inventors of RSA that [it was cracked years ago].
1. RSA is not known to be cracked and in general is still considered HARD - though the rapidly increasing amount of free and cheap CPU time will eventually defeat most of today's common length keys in 35-50 years (who knows?). That said, it may be possible that RSA gets cracked next week - I wouldn't be surprised. I too have a few fri
Re:Crypto is scary stuff (Score:4, Insightful)
Boy, you don't know that much about cryptography, do you ;)
Blasphemy #1: I've heard from a claimed friend of one of the inventors of RSA that it was cracked it years ago. Yet, it continues to get worldwide use. Sure my friend was probably full of it... but who am I suppose to trust here? The government?
That's complete BS. It hasn't been cracked, and it wont be for a long time. Just remember to use big keys and your stuff is safe. As for who you are supposed to trust, you're supposed to trust the huge mathematical community that every day is pounding and pounding and pounding on this problem. They are honest academics, and if there is even a hint of progress it will become public.
Blasphemy #2: One of my close friend's mother had to switch fields from Numerics after she published some papers considered too sensitive. It had something to do with factoring.
I'm not entirely sure what the hell you are saying. Are you saying that your friends mother is a genius mathematician who published a few papers about factoring and was somehow forced to leave the field? That's completely ridiculous, lots of people publish papers on factoring every year. Either you are lying or you have completly misunderstood the matter.
Blasphemy #3: Anybody else notice that quantum computers have been proven to be capable of factoring really well, but no one has shown that they can solve any NP-hard algorithms? Come on... factoring isn't NP hard.
This is a common misconception, that quantum computers will be like a regular computer, "but way faster". This is not so, a quantum computer works in a fundamentally different way, a way that makes it possible to invent algorithms that are way faster than anything on a classical computer. Many of these new algorithms are made for cryptanalysis, namely Shor's algorithm (integer factorization in polynomial time, breaks RSA), the discrete logarithm algorithm (breaks Diffie-Hellman) and Grovers algorithm (would speed up standard brute forcing cracking, but only a quadratic amount which means that you can just double your key length, and it's still as hard).
As for complexity, the decision-problem form of integer factorization ("Is there a factor of M smaller than N?") is indeed in NP, but the specific class is an unresolved problem. Most people doubt that it is in either P or NP-Complete which would most certainly make it NP-hard (unless P=NP ofcourse, but that's a whole 'nother discussion ;) Maybe you are thinking of primality testing, which has very recently been proven to be in P. The whole village rejoiced.
Then, there's just some silly stuff I've noticed about crypto. Why do we always seem to use encryption just a generation or so ahead of what is needed to crack it? SHA-1 for example...
Has been a problem in the past, but we've learned our lesson. 256 bit AES will (very possibly) never be cracked by an ordinary computer. A quantum computer might, but it would have to be one bad-ass quantum computer. 256 bit AES is completely safe.
And, why do we encrypt one small block at a time. Each encrypted file usually gives many independent chances to crack the key, and in many cases, some of those blocks have known data.
It doesn't matter one iota whether a block has known data or not. You still need the key to have any idea what is in there or not (that is, imagine you suspect a block of data Y has encrypted X, there is no way you can prove that if you don't have the key). There is something called chosen plaintext attack which you can do a similar thing in public key cryptography, but it is only works in bad implementations of it.
Also, public key is great, but secret key can be easily shown NP-hard to crack (in terms of secret key length) with semi-reasonable assumptions, while public key has no such simple proof. I personally have been trying to prove that no public key system can be NP-hard, but what the heck... I'm not that good. Howe
Re: (Score:2)
Re: (Score:3, Informative)
Ohh, you're one of those people. The paranoid, cynic, LBJ-killed-Kennedy people with more willingness to post on slashdot than knowledge about the subject. There is a name for those kind of people, and infact, it's one of the moderation options on slashdot....
First off, on the you-can't-do-research bit. My point was that there are thousands of scholars working on this very subject every day, yet they never get threatened by any sort of law enforcement? How does that fit with your little paranoid world-view
Re: (Score:2)
There is no proof that it is and no reason to think that it is. We just have no fast algorithm for it.
"Then, there's just some silly stuff I've noticed about crypto. Why do we always seem to use encryption just a generation or so ahead of what is needed to crack it?"
That's largely a matter of ke
Re: (Score:3, Informative)
I'm a professional mathematician and have had the opportunity to work with and become friends with some big names in number theory and factoring. No one can know for certain, but my friends were of the general opinion that RSA was probably okay.
Re: (Score:3, Insightful)
They're only independent if you use ECB, and anyone using ECB deserves what they get. Cipher modes like CBC or CTR solve these problems.
Re: (Score:2)
So you must think it is possible that every time one of these students publishes a paper on a fast way to factor large numbers, he vanishes, never to be seen again. How many people vanished from the math dept. of your school? That just doesn't happen. Unlless "they" (meaning all of academia) are also i
Snake oil that uses AES (Score:5, Insightful)
AES itself of course is nigh-on as trustworthy a cryptographic primitive of its kind that we have. But just because you've used the right primitive, doesn't mean you've built a secure product. You have to consider what chaining mode to use, how to handle passphrases if they exist, how to keep your secrets secret, defense against side channel attacks, and more.
What I look for is a product that provides enough information that I can actually assess its security - what attacks they've considered and how they've built the product to defend against them. What I see disturbingly often is a bald declaration that the product is secure, because it uses AES.
Check the certification (Score:2)
NIST maintains a list of those who passed the tests successfuly, and were certified to use AES in their products.
So, besides making sure that all the things mentioned by the parent were done right, check out whether the algorithm itself was properly implemented.
That list doesn't seem to help (Score:2)
It requires expensive... blah blah blah (Score:3, Insightful)
No. It requires reading a couple of good, inexpensive books and understanding of what the heck you're doing. Math behind the whole thing can be complicated. But you don't really need to understand the math 100% here. All you need to know is whether an algorithm is considered "strong" by today's standards, understand a few key concepts, guard your keys, and aproach security related coding with a healthy amount of paranoia.
In other words, a decent developer can get a pretty good understanding of this all in two weeks or less. And these skills need to become "common" already.
No, it's much harder than you think. (Score:5, Insightful)
Even the experts make errors in cryptographic protocol design and implementation - I've been doing this for ten years and I've made at least one howler myself. Why do you think, contrary to the advice of pretty much everyone who really knows their stuff, that people with a couple of week's worth of knowledge can get this stuff right?
and what if... (Score:2)
I just finished up a system where I do use (very) predictable IVs in CBC mode (with AES128).
From what I could tell, an IV really only helps with preventing parallel dictionary attacks. That is, like people use against the UNIX crypt function (in passwd files). Since there won't be more than about 30 things ever encrypted with this key, I figured I didn't need the additional security IV gives me.
And besides, the IV has to be in the code or data somewhere, as
Re: (Score:2)
Your guess about what the IV is for is mistaken
why am I hand-rolling my crypto? (Score:2)
But really it's because the system I'm using is an embedded system. And by embedded system I don't mean a full-blown PC running Linux, I mean a small system. I was allocated about 4,000 instructions for my crypto work (and an AES ECB accelerator).
In CTR mode, the each encryption doesn't depend on other data
Re: (Score:2)
I'm a layman in the field, but it just so happens that I just read Practical Cryptography. The book makes it very clear that you should never depend on encryption for checking the a
Re: (Score:2)
As the guy says, don't use CBC for authentication; that's broken. Since you have an AES accelerator EAX mode is probably a good fit; it provides both encryption and authentication.
You can do it wrong if you prefer, but it should be possible to do it right.
Re: (Score:2)
Which books would you want to see on someone's bookshelf for you to consider respecting them?
Re: (Score:2)
Conference proceedings are a good sign, especially with your name on the contents page
Re: (Score:3, Informative)
Re: (Score:2)
Scheiner wrote that book. It is Secrets & Lies [schneier.com]. This quote from the preface [schneier.com] sums it up:
Re: (Score:2, Interesting)
Re: (Score:3, Insightful)
No. It requires reading a couple of good, inexpensive books and understanding of what the heck you're doing.
That is an understatement.
Reminds me of the time I watched a finance person use PGP to encrypt a very sensitive file they sent via email. They did everything right except for one critical part.
After the file was encrypted, they deleted the original one as per instructions. Trouble was it was in the "Recycle" bin a readable.
How is this different from any other product? (Score:5, Informative)
Products that implement cryptography are probably credence goods. It requires expensive and uncommon skills to verify that data is really being protected by the use of cryptography, and most people cannot easily distinguish between very weak and very strong cryptography.
Can you distinguish, by inspection, between a reliable automobile and a piece of junk that will barely last 2 years? I certainly can't. So I rely on reviews by people I trust when I buy a new car.
In the field of cryptography there are several people who have written peer-reviewed books about cryptography, are trusted in the community, and who occasionally review products. Bruce Schneier [schneier.com] is one (there are others, use Google, this is not mean to be a puff for Schneier or his company).
There are also open-source cryptographic programs [gnupg.org], which are peer-reviewed and definitely not snake-oil.
Don't use weak ROT-13 (Score:5, Funny)
Re: (Score:2)
At least '1, 2, ???, profit', 'I, for one...' and 'haha it says nothing to see here OMGWTFBBQAOLCIA' are finally being retired.
Re: (Score:2)
ROT-13 is encoding; ROT by an unknown amount, where the unknown amount is the key, is encryption.
Re: (Score:2)
Use ROT-12 (Score:2)
Some insights about the article (Score:5, Interesting)
Some time ago, I tried to evaluate if a Enterprise Service Bus (intercomponent communication) was fit enough to be put into a production environment. It said that it had AES encryption build in. When I looked at the manual, it displayed a pop up window where you could choose the key-size. It listed exactly all key sizes that were *not* possible for AES. This was a very short evaluation, I can tell you. This also shows a very important thing about cryptography: the algorithms used say very little about the security of an application.
Generally, the manual for cryptographic services is easy to find. This is simply because cryptography is added at the end of the development lifecycle. This is logical because cryptography is not part of the main functionality of most applications (e.g. mime encryption in email products). It's something that was added after the products main functionality was finished. So just look at the last paragraph, or Appendix Z and you are looking at it.
Sometimes it is easy to see why so many products contain bad cryptography. Take XML signatures for instance. XML signatures themselves contain *references* to the data that is signed and the cryptographic techniques used. If you are to verify an XML digital signature, you *must* check if these are not altered. Furthermore, you must keep the XML schema-definitions on your own disk, and not retrieve them from the internet. Nevertheless, I've not seen any API-documentation even mentioning this rather obvious cryptographic insight. You can rest assured that there will be many implementations that will get this wrong.
Cryptography is hard.
The real insight of this story is the listing of the products into "credence goods". If you can call this new insight. Otherwise, it's just stating the well known/obvious.
Truecrypt (Score:4, Interesting)
Sure, large clusters of powerful servers working in tandem(or quantum computing) may render the factoral math behind crypto obsolete. A nice thing though, is that those kind of solutions are limited to those that can afford them. Still, even if it's all true, and I'm wasting my time encrypting things, what better solutions do we have?
Re:Truecrypt (Score:4, Interesting)
Re: (Score:2)
Care to explain that a little bit further?
Re: (Score:2)
In recent versions of TrueCrypt, the encryption is performed using tweakable block ciphers in way that reuse tweaks. When a sector is written, a sequence of 32 tweaks is used for each 16 byte cipher block. If this sequence was used only once, the encryption would have been as secure as the underlying cipher. However the same sequence is used every time a write is performed to the same sector. Thus by looking on two encryptions of the same sector, you can tell exactl
Re: (Score:2)
Obviously, you don't know much about designing and developing transparent real-time disk encryption software. The two attributes "transparent" and "real-time" rule out any solution that is not 1-to-1 mapped.
That's why all transparent real-time disk encryption programs (PGPDisk, TrueCrypt, etc.) use and have to use 1-to-1 mapping.
Re: (Score:3, Insightful)
Re: (Score:2)
You fail to distinguish between using additional disk space and using additional CPU time. It appears 1% of extra disk space usage can give you more security than 100% of extra CPU time usage.
As long as you are only willing to pay a price in CPU time, it is true that you will only get better granularity. But a factor of 32 on the granularity may very well be worth the effort, in particular if you could get the granularity above the units alloc
Re: (Score:3, Interesting)
That is absolutely correct. In fact you didn't even have to use the word efficient here. Any 1-to-1-mapped encryption is subject to such attacks. The point is that if you are willing to sacrifice a few percent of disk space, you can improve security.
One encryption sacrificing about 3% of disk space is GBDE. Unfortunately GBDE suffers from a few other probl
Re: (Score:2)
You seem to belive the authors of that product know everything. I don't know how you got that idea.
Vulnerable to some kind of watermarking? Probably yes. As vulnerable as TrueCrypt? Not necesarilly, methods a little more secure than what TrueCrypt does have been known for years, but they usually require twice as much CPU time.
Re: (Score:2)
Raw power alone cannot overcome modern encryption. One either has to find a flaw in the encryption algorithm, or the implementation being used; or use something radically different from your run of the mill Turing machine, such as a quantum computer. Otherwise, you simply have too many possibilities to feasibly calculate; even with the fastest computers in the world, the Sun
The classic warning signs. (Score:2)
Last updated 1998, still insightful.
Classic snake oil: Blitzkrieg! (Score:2, Interesting)
Anyone remember the Blitzkrieg server [attrition.org], which seems like the solution to all of the world's security needs? The expression Bruce Schneier used was "just too bizarre for words". I don't know if this was an elaborate trolling attempt or an actual real honest scam to deceive the terminally dumb, but it's fun to read, still, just for the amazing technobabble and ludicruous claims.
honesty in vendors .. (Score:2)
There has also been speculation why Windows requires three unique signing keys [cryptome.org]. The disengenious reason given being that in case the first one got lost in
Try This... (Score:3, Informative)
These products have been reviewed by independent labs, who review their implementation to verify that cryptographic mechanisms are implemented properly. This includes reviewing source code and/or hardware designs. Just a thought for anyone who is truly concerned that their hardware or software be compliant. (Note: If you want a "secure" operating system, look into CC Evaluation.)
an old problem (Score:4, Interesting)
Encryption was added to RB so that it was possible for you to give away portions of your program's "source code" (the human readable part) without anyone actually being able to READ it. They could incorporate your souce into their new project and use it normally, they could just not read it or make changes to it.
This sounds like a nice idea, until you realize that when you get someone's "encrypted" source code and add it to your program, the compiler has to be able to read the source code, because it needs to translate it for your new program. This means one thing: the encryption is not secure because the compiler itself must somehow posess a "master key" of sorts so that it can read the source code to do its thing. So... when you select the module and try to open it to look at it, it's not that it can't read it.. it's that it won't read it. A sufficiently skilled programmer could go into the compiler and flip a switch inside it and basically say "ignore that", and you would have unrestricted access to the so called "encrypted" informataion.
I assisted with a project where we found out how this information was encrypted. In short, a fixed key was used to encrypt the project data. Then a different fixed key was used to encrypt the passcode you would use to "protect" the project. Thus, the compiler could ask you for the password if you wanted to read your own project, and it could verify you typed in the correct passcode. If you did, it would decrypt the project for you to view. So you see, the compiler does not NEED the passcode, it simply WANTS it.
It took us about a week to write a program that would read in the projects, decrypt them using the fixed key and completely ignoring the passcode thing, and saved an unprotected naked project file that anyone could edit or view.
This is probably not too far from the mark on how a LOT of programs "protect your privacy". In reality they are only protecting you from the casual inspection. Anyone that really wants your data can get it, all too easily. Be sure that with any program you are certain that the program NEEDS the passcode to unlock your data. If it only WANTS it, (is there a password reset option available?) then you know it's "security through obscurity", and we know how totally worthless that is.
You thought your windows or OS X keychain was secure? You have auto login turned on? Does the computer need your password? Think about it.
Re: (Score:2)
Peril of the semi-educated know-it-all (Score:3, Insightful)
For the vendor this creates a conflict. On the one hand, you want to satisfy the customer's request. On the other hand, you know your customer is shooting himself in the foot and very possibly becoming a vendor reputation problem later on down the line.
In my experience, most customers are accustomed to being "always right" and fail to recognize that crypto/security may be one of those things that they simply do not know enough about and to let the vendor help them. It is often the case that the vendor can explain/evangelize and detail the very attack the customer is opening himself up to with little or no effect - the customer is convinced they know it all.
Quick, answer this (Score:2)
Discussing encryption under ideal circumstances is like saying birth control pills are 99.97% effective when taken as directed in laboratory studies.
Re: (Score:2)
Re: (Score:2)