[2366] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Good Point (Weak Crypto and Y2K)

daemon@ATHENA.MIT.EDU (Ernest Hua)
Wed Mar 25 15:04:23 1998

From: Ernest Hua <Hua@teralogic-inc.com>
To: "'Cindy Cohn'" <Cindy@mcglashan.com>, "'John Gilmore'" <gnu@toad.com>
Cc: "'cryptography@c2.net'" <cryptography@c2.net>,
        "'Arnold G. Reinhold'"
	 <reinhold@world.std.com>
Date: Wed, 25 Mar 1998 09:45:50 -0800

Cindy and John,

I think Arnold is using a very good illustration below of the pitfalls
of designing only for the needs of today.

While this is not necessarily the much more serious 1st Amendment
concerns, it is something much more tangible to the public.

I would vote for bringing Y2K up as an example of why compromises in
security for the sake of spook agencies could be a very bad thing 10 or
20 years down the road.

Ern

	-----Original Message-----
	From:	Arnold G. Reinhold [SMTP:reinhold@world.std.com]
	Sent:	Wednesday, March 25, 1998 5:36 AM
	To:	Nathan Spande; 'perry@piermont.com'
	Cc:	'cryptography@c2.net'
	Subject:	Weak Crypto and Y2K

	At 4:29 PM -0600 3/23/98, Nathan Spande wrote:
	>>
	>	I have a recollection of reading that there have been no
reports
	>of credit-card fraud through a straight 40-bit SSL link.
Probably from
	>amazon.com, but I would believe that it wasn't true.  Anyway, I
guess
	>the point is that even weak crypto is likely to cut down on
most of
	>this, given the significantly more difficult nature of
decrypting an SSL
	>session to get a single card number.  Granted, once a tool for
doing
	>this becomes available, rates would rise.  But we know two
things about
	>most criminals: stupid and lazy.  Once it becomes difficult to
slurp
	>credit card numbers off the net, they are going to move on to
easier
	>targets.  Even 56 bits makes it so much more difficult to get
individual
	>numbers that they are going to attack the storage mechanism.
That is
	>where the real difficulty has come in: keeping the databases
safe.  That
	>isn't so much about cryptography as it is about good security
	>administrators and system administrators.  Granted: good strong
crypto
	>has a place in every authentication system.
	>

	I think there is a parallel between designing electronic
commerce
	infrastructure today that use weak cryptography (i.e. 40 or 56
bit keys)
	and, say,  designing air traffic control systems in the '60s
using two
	digit year fields. You know it will work well enough for now,
but that it
	will certainly be a problem in the future. Yes, there are other
weak points
	that will have to be addressed, but that is no excuse for
employing
	crippled technologies.  Just because you can retire before it
all blows up
	doesn't make it any less irresponsible.


	Arnold Reinhold


	Got crypto?  http://ciphersaber.gurus.com


home help back first fref pref prev next nref lref last post