[1079] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Thoughts on the next target.

daemon@ATHENA.MIT.EDU (David P. Jablon)
Tue Jun 24 16:21:49 1997

Date: Tue, 24 Jun 1997 16:03:07 -0400
To: "Marcus Leech" <mleech@nortel.ca>
From: "David P. Jablon" <dpj@world.std.com>
Cc: cryptography@c2.net
In-Reply-To: <199706240159.AA187817594@bftzh114.ott.bnr.ca>

Marcus,

I think you advocate a too-narrow approach to targeting
and exposing bad crypto security.

I wrote:
>> Any of several widely-used challenge/response password
>> systems make attractive targets.
You replied:
>Many of these systems (CryptoCard, etc) use DES in one mode or another,
>  and the ones that don't use DES use a proprietary hash function.

Even if triple-DES or SHA1, if it's used inappropriately, say
for ordinary challenge/response authentication of a password,
then the method is weak.

>I think it's "splashier" to demonstrate weakness in widely publicized,
>  and widely used (in the used-in-more-than-one-application sense)
>  algorithms.

I disagree.  *All* widely used methods are splashy and important
targets, regardless of whether the technical details are public, and
regardless of "how many" applications use the method.  Fortunately
for us, there are *lots* of widely used lame systems, though many
if not most use unpublished methods.  To ignore these or pretend
that they either aren't newsworthy or aren't a threat seems cowardly.

> Brute-forcing the SecurID hash algorithm, for example would require
>  that someone violate their license agreement with Security Dynamics/RSA.
>  "Algorithm Thieves today showed that SecurID cards aren't as secure
>   as manufacture claims".

It's sad when security relies on these agreements.  But I wasn't
particularly thinking of SecurID.  There are much more attractive
targets, which are only protected by shrink-wrap "agreements"
against reverse engineering.  As far as I know, these have zero
power.  Reverse-engineering is a time-honored and
courtroom-sanctioned privilege for buyers of off-the shelf
technology, when no signature below the fine print is required.

For example, I'm thinking about unwitting users of certain
network operating systems, who say, plunk themselves
down on a new broadband cable network.  Even if they click all
the right buttons during installation, they are still sharing a network
with friends or foes that can eavesdrop and perform brute-force
attacks.

If we only target vendors of open, fully documented,
non-proprietary solutions, then the less-sincere vendors
will seek refuge in the dark corners of security through
obscurity.  They at least need to be exposed.

------------------------------------
David Jablon
web: http://world.std.com/~dpj/
email: dpj@world.std.com


home help back first fref pref prev next nref lref last post