[148654] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] how reliably do audits spot backdoors? (was: Re:

daemon@ATHENA.MIT.EDU (James A. Donald)
Tue Dec 24 13:04:16 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 24 Dec 2013 17:32:53 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <r422Ps-1075i-5787A29FEB1547A993116105232DF795@Williams-MacBook-Pro.local>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-12-24 03:36, Bill Frantz wrote:
> Note that the bugs were limited to 100 lines of code because of the
> limited amount of time available for the code review. A real system
> would probably consist of many times 100 lines of code, especially if
> the compiler and runtime environments are included. Since backdoors can
> be designed that depend on "innocent" insertions in several separate
> parts of the code, the complexity of the search goes up faster than
> linearly with code size.

In code reviews, I automatically reject things that make the complexity 
of the search go up faster than linearly.

The underhanded C examples all, or all I glanced at, used obfuscation, 
uglification, and complexification, that would have been immediately 
thrown out in code review, without anyone bothering to figure out what 
the obfuscation obfuscated, what the uglified and complexified code 
actually did.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post