[12399] in cryptography@c2.net mail archive
Re: [IP] Master Key Copying Revealed (Matt Blaze of ATT Labs)
daemon@ATHENA.MIT.EDU (Faust)
Sun Jan 26 23:15:51 2003
X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
To: Donald Eastlake 3rd <dee3@torque.pothole.com>
Cc: Pete Chown <Pete.Chown@skygate.co.uk>,
cryptography@wasabisystems.com
From: Faust <urfaust@optushome.com.au>
Date: Mon, 27 Jan 2003 13:57:30 +0000
In-Reply-To: <Pine.LNX.4.44.0301262037120.16229-100000@netbusters.com> (Donald
Eastlake 3rd's message of "Sun, 26 Jan 2003 21:12:34 -0500 (EST)")
> You are coming at this from a software/computer mindset that just isn't
> applicable to this sort of physical world security.
Matt's paper was about _locks_.
In case you have forgotten, the title was "Cryptology and Physical Security:
Rights Amplification in Master-Keyed Mechanical Locks".
To weakly criticize his paper because it did not talk about the cost of
fabrication or physical tolerances misses the point entirely.
There _are_ situations where information leakage is of concern.
I can imagine other applications of Matt's methods to other forms of
physical security.
In any case, it is intrinsically interesting
In practice, social engineering is far easier to use to access secure premises.
Bribe a guard, go to bed with a person with access etc..
However, that is not the proper domain of a study of rights amplification.
--
natsu-gusa ya / tsuwamono-domo-ga / yume no ato
summer grasses / strong ones / dreams site
Summer grasses,
All that remains
Of soldier's dreams
(Basho trans. Stryk)
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com