[758] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Full Strength Stronghold 2.0 Released Worldwide

daemon@ATHENA.MIT.EDU (Rick Smith)
Thu May 8 14:07:51 1997

In-Reply-To: <19970507225925.26689@bywater.songbird.com>
Date: Thu, 8 May 1997 11:42:02 -0600
To: Kent Crispin <kent@songbird.com>, cryptography@c2.net
From: Rick Smith <smith@securecomputing.com>

Matt Blaze wrote:

> Anyway, any key recovery mechanism adds so much complexity to the system
> that, at a minimum, alternatives should be carefully explored first.

Kent Crispin replied:

>With all due respect, this is nonsense.  Key Recovery has been
>implemented and deployed in commercial systems.  It's conceptually
>obvious, and straightforward to implement.

I beg to differ. The fact that it's been deployed in a few products doesn't
say anything about it having been built or deployed correctly. There are
numerous ways to make key recovery work, each with its own subtle trade
offs regarding key safety and key availability. Until there have been a few
years of cycles of extensive deployment, upgrade, and routine usage of the
recovery process we really can't accurately say how clean, safe, and easy
it all is. It's even too soon to tell which of the numerous alternatives is
best for a particular purpose.

Rick.
smith@securecomputing.com



home help back first fref pref prev next nref lref last post