[148807] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] What do we know? (Was 'We cannot trust' ...)

daemon@ATHENA.MIT.EDU (Bill Frantz)
Sat Dec 28 14:08:28 2013

X-Original-To: cryptography@metzdowd.com
Date: Sat, 28 Dec 2013 10:56:59 -0800
From: Bill Frantz <frantz@pwpconsult.com>
To: cryptography@metzdowd.com
In-Reply-To: <52BF15CF.9000100@gladman.plus.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 12/28/13 at 10:17 AM, brg@gladman.plus.com (Brian Gladman) wrote:

>Following on from this, Honeywell was funded by Dod to produce a new
>secure computer system (called SCOMP) and this again received
>certification.  But it was never deployed (AFAIK) because it was
>realised that the costs of ongoing support would fall entirely on DoD.

There is an amusing story about SCOMP. SCOMP was designed to get 
an A1 security rating, and after jumping through all the hoops 
actually received that rating. Somewhat after that, someone 
discovered a quite high bandwidth covert channel in SCOMP. One 
of the developers was heard to quip, "I don't want to call is 
secure. I just want to call it A1."

Cheer - Bill

-------------------------------------------------------------------------
Bill Frantz        | The first thing you need when  | Periwinkle
(408)356-8506      | using a perimeter defense is a | 16345 
Englewood Ave
www.pwpconsult.com | perimeter.                     | Los Gatos, 
CA 95032

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post