[147190] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] The paranoid approach to crypto-plumbing

daemon@ATHENA.MIT.EDU (Stephan Neuhaus)
Tue Sep 17 14:31:06 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 17 Sep 2013 20:22:57 +0200
From: Stephan Neuhaus <stephan.neuhaus@tik.ee.ethz.ch>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
In-Reply-To: <E1VLnyl-0006cR-Lg@login01.fos.auckland.ac.nz>
Cc: bascule@gmail.com, cryptography@metzdowd.com, frantz@pwpconsult.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-09-17 07:37, Peter Gutmann wrote:
> Tony Arcieri <bascule@gmail.com> writes:
>> On Mon, Sep 16, 2013 at 9:44 AM, Bill Frantz <frantz@pwpconsult.com> wrote:
>>> After Rijndael was selected as AES, someone suggested the really paranoid
>>> should super encrypt with all 5 finalests [...].
>>
>> I wish there was a term for this sort of design in encryption systems beyond
>> just "defense in depth". AFAICT there is not such a term.
>>
>> How about the Failsafe Principle? ;)
> 
> How about Stannomillinery?

I like Stannopilosery better, but the first half is a keeper.  Or,
perhaps a bit incongruously, Stannopsaffery.

Fun,

Stephan
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post