[11722] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: unforgeable optical tokens?

daemon@ATHENA.MIT.EDU (Barney Wolff)
Sat Sep 21 19:15:49 2002

Date: Sat, 21 Sep 2002 15:05:23 -0400
From: Barney Wolff <barney@tp.databus.com>
To: David Wagner <daw@mozart.cs.berkeley.edu>
Cc: cryptography@wasabisystems.com
In-Reply-To: <amh2ge$dta$1@abraham.cs.berkeley.edu>

On Sat, Sep 21, 2002 at 06:10:22AM +0000, David Wagner wrote:
> Barney Wolff  wrote:
> >Actually, it can.  The server can store challenge-responses in pairs,
> >then send N as the challenge and use the N+1 response (not returned)
> >as the key.
> 
> But why bother?  What does this add over just using crypto
> without their fancy physical token?  The uncloneability of
> their token is irrelevant to this purpose.  You might as well
> just carry around a piece of paper, or a floppy disk, with a
> list of keys on it.

In a logical sense, perhaps nothing.  But in a practical sense, two
methods of key agreement that produce equal-entropy keys may differ
in computational cost or latency.  I don't pretend to know how this
would compare with other key derivations on those axes.

The advantage over paper or floppy is as stated - temporary posession
of the token does not allow the attacker to see or spoof future traffic.

However, it would make prior traffic vulnerable, so I must agree that
simpleminded token-based key derivation does not appear to be prudent.

-- 
Barney Wolff
I'm available by contract or FT:  http://www.databus.com/bwresume.pdf

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post