[148653] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] how reliably do audits spot backdoors?

daemon@ATHENA.MIT.EDU (James A. Donald)
Tue Dec 24 13:03:34 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 24 Dec 2013 17:27:52 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <alpine.BSO.2.03.1312221639590.23573@astro.indiana.edu>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


> On Sun, 22 Dec 2013, Bill Cox wrote:
> [[re Peter Gutmann's claim that backdoors in source-code
> may escape discovery in audits]]
>> Nonsense.  Most other equally capable developers should be able to discover
>> a backdoor with far less effort to hide it.  Reading other people's code is
>> a skill that some people never acquire, but it's generally easier to
>> understand someone else's code entirely than to have created it from
>> scratch.

On 2013-12-23 10:51, Jonathan Thornburg wrote:
> Looking at the winners in the Underhanded C Contest
>    http://underhanded.xcott.com/
> strongly suggests that Peter is right.  And these are backdoors hidden
> in on-the-order-of-100 lines of code, which is a lot smaller (and thus
> harder-to-hide-a-backdoor-in) than most real crypto code.

The example backdoor would not have survived normal code review by me.

So all you need is people like me reviewing code.  Which you should do 
anyway.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post