[1738] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Why crypto is harder than other high-reliability engineering

daemon@ATHENA.MIT.EDU (Zooko Journeyman)
Sat Oct 11 14:20:15 1997

Date: Sat, 11 Oct 1997 02:17:01 +0200 (MET DST)
From: Zooko Journeyman <zooko@xs4all.nl>
To: cryptography@c2.net, frantz@netcom.com, johnl@iecc.com,
        penny@authentex.com


Hello Penny, Bill, JohnL & Perry's Crypto List.


An important difference between security software and general 
"high-reliability" software is that in security you are
considering the possibility of malicious, intelligent humans
with unknown capabilities attempting to manipulate your system.
This is a much more stringent test than the normal "anything 
that can go wrong will go wrong" approach to highly reliable 
systems.


There are two implications of this:  An active attack against 
a system can be a lot "harder on the system" than even the 
slings and arrows of outrageous fortune, and the methods of
attack may be complicated or "unlikely" enough to evade the
notice of those responsible for designing, implementing, 
testing and safe-guarding the system.


I've been told that successful attacks on supposedly secure 
systems often involve complex or "unlikely" sequences of
events which were overlooked by engineers who successfully 
designed for all kinds of "natural" conditions.


Regards,

Zooko, Journeyman Engineer


home help back first fref pref prev next nref lref last post