[11042] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: crypto/web impementation tradeoffs

daemon@ATHENA.MIT.EDU (Ben Laurie)
Thu Jul 4 12:24:09 2002

Date: Thu, 04 Jul 2002 16:57:07 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: John Saylor <johns@worldwinner.com>
Cc: cryptography@wasabisystems.com

John Saylor wrote:
> Hi
> 
> I'm passing some data through a web client [applet-like] and am planning
> on using some crypto to help ensure the data's integrity when the applet
> sends it back to me after it has been processed.
> 
> The applet has the ability to encode data with several well known
> symmetric ciphers.
> 
> The problem I'm having has to do with key management.
> 
> Is it better to have the key encoded in the binary, or to pass it a
> plain text key as one of the parameters to the applet?
> 
> I know that the way most cryptosystems work is that the security is in
> the key. But having a compiled-in key just seems like a time bomb that's
> going to go off eventually. Is it better to have a variable key passed
> in as data [i.e. not marked as "key"] or to have a static key that sits
> there and waits to be found.

If all you want to ensure is integrity, why are you using symmetric 
encryption? Surely a keyed HMAC would make more sense?

Not that this changes your question. However, you haven't specified your 
threat model, so I feel unable to answer.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post