[12399] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [IP] Master Key Copying Revealed (Matt Blaze of ATT Labs)

daemon@ATHENA.MIT.EDU (Faust)
Sun Jan 26 23:15:51 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
To: Donald Eastlake 3rd <dee3@torque.pothole.com>
Cc: Pete Chown <Pete.Chown@skygate.co.uk>,
	cryptography@wasabisystems.com
From: Faust <urfaust@optushome.com.au>
Date: Mon, 27 Jan 2003 13:57:30 +0000
In-Reply-To: <Pine.LNX.4.44.0301262037120.16229-100000@netbusters.com> (Donald
 Eastlake 3rd's message of "Sun, 26 Jan 2003 21:12:34 -0500 (EST)")


> You are coming at this from a software/computer mindset that just isn't
> applicable to this sort of physical world security. 


Matt's paper was about _locks_.
In case you have forgotten, the title was "Cryptology and Physical Security: 
Rights Amplification in Master-Keyed Mechanical Locks".

To weakly criticize his paper because it did not talk about the cost of
fabrication or physical tolerances misses the point entirely.

There _are_ situations where information leakage is of concern.

I can imagine other applications of Matt's methods to other forms of
physical security.

In any case, it is intrinsically interesting 

In practice, social engineering is far easier to use to access secure premises.
Bribe a guard, go to bed with a person with access etc..
However, that is not the proper domain of a study of rights amplification.

-- 

natsu-gusa ya   / tsuwamono-domo-ga   / yume no ato
summer grasses  / strong ones         / dreams site
 
Summer grasses,
All that remains
Of soldier's dreams
(Basho trans. Stryk)


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post