POV-Ray : Newsgroups : povray.off-topic : Fun with cryptography Server Time
7 Sep 2024 23:28:32 EDT (-0400)
  Fun with cryptography (Message 5 to 14 of 74)  
<<< Previous 4 Messages Goto Latest 10 Messages Next 10 Messages >>>
From: Orchid XP v8
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 02:28:10
Message: <486c717a@news.povray.org>
>> The document claims this is because "IPSec is too complicated to be 
>> secure", and that "TSL is mature and battle-tested".
> 
> I like how they make this assertion, then later on say "you might need 
> the load balancing that IPsec does, but you can get that with OpenVPN by 
> running this other complicated program on a spare machine." It sounds 
> like a lot of the complication is stuff that OpenVPN basically leaves out.

Well, is that a protocol feature or a software feature?

> Plus, I'm not really sure how they're running TLS over UDP, given that 
> TLS is stream-oriented and assumes reliable delivery. It's also not real 
> obvious from their descriptions that it's possible to run a UDP protocol 
> over OpenVPN.

Hmm, that's a good point.

>> Also amusing is the statement "Blowfish is a very strong algorithm 
>> with no known weaknesses. Its 128-bit key provides us with a large 
>> enough key space to make brute force key attacks impossible in 
>> polynomial time." Erm... like... WTF?
> 
> Of course, it hasn't been tested as furiously as AES, either.

I was more amused by the statement that key size has any relationship to 
complexity class.

Blowfish is far more popular than, say, TEA or SQUARE or any number of 
other ciphers from the zoo of less-known algorithms out there. I note 
however that Blowfish has been "replaced" by Twofish which is meant to 
be stronger. (And AES finalist, I believe.)

A lot of people are apparently jumpy about the whole XSL attack thing on 
AES.


-- 
http://blog.orphi.me.uk/
http://www.zazzle.com/MathematicalOrchid*


Post a reply to this message

From: Darren New
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 12:35:24
Message: <486cffcc$1@news.povray.org>
Orchid XP v8 wrote:
>>> The document claims this is because "IPSec is too complicated to be 
>>> secure", and that "TSL is mature and battle-tested".
>>
>> I like how they make this assertion, then later on say "you might need 
>> the load balancing that IPsec does, but you can get that with OpenVPN 
>> by running this other complicated program on a spare machine." It 
>> sounds like a lot of the complication is stuff that OpenVPN basically 
>> leaves out.
> 
> Well, is that a protocol feature or a software feature?

I'm saying that they mock IPsec for solving problems *they* don't have, 
because it was "designed by a committee".  I suspect the people on the 
"committee" actually *did* have those problems, so incorporated 
solutions to them into the standard, instead of making everyone solve it 
themselves with ad hoc solutions consisting of interacting layers which 
could easily introduce a security hole if you don't know what you're doing.

> I was more amused by the statement that key size has any relationship to 
> complexity class.

Yes, I understood the WTF. :-) Of course, if it's running over TLS, you 
can put whatever cipher both sides agree on in there.

And actually, key size *can* have a relationship to complexity class, 
perhaps. If you can pre-compute something that lets you look up in 
polynomial time the key that someone is using, except that the key is 
too long to store the precomputed somethings for every key, I can see 
where that can happen. (Technically, the same complexity class, but in 
practice, you can break something in polynomial time if you discount the 
precomputation, perhaps.)

But yeah, the whole discussion was full of WTFs like that. Plus, they 
say basically "IPSec is too complicated to deploy, OpenVPN does the same 
thing only its easy to deploy", without giving any evidence at all of 
either. Most of the paper is a description of SSL, and I'm pretty sure 
there aren't fundamental security problems with IPSec that aren't in SSL.

(And apparently the authors don't know that actual difference between 
SSL and TLS.  Hint: OpenVPN seems to use SSL.)

-- 
Darren New / San Diego, CA, USA (PST)
  Helpful housekeeping hints:
   Check your feather pillows for holes
    before putting them in the washing machine.


Post a reply to this message

From: Orchid XP v8
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 13:57:54
Message: <486d1322$1@news.povray.org>
Darren New wrote:

> But yeah, the whole discussion was full of WTFs like that. Plus, they 
> say basically "IPSec is too complicated to deploy, OpenVPN does the same 
> thing only its easy to deploy", without giving any evidence at all of 
> either. Most of the paper is a description of SSL, and I'm pretty sure 
> there aren't fundamental security problems with IPSec that aren't in SSL.
> 
> (And apparently the authors don't know that actual difference between 
> SSL and TLS.  Hint: OpenVPN seems to use SSL.)

Hmm. I just wanted to know whether this piece of software was worth using.

I think I have my answer now...

-- 
http://blog.orphi.me.uk/
http://www.zazzle.com/MathematicalOrchid*


Post a reply to this message

From: Darren New
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 15:56:14
Message: <486d2ede$1@news.povray.org>
Orchid XP v8 wrote:
> Hmm. I just wanted to know whether this piece of software was worth using.
> I think I have my answer now...

Oh. I imagine if it solves the problem you have, it's probably worth 
using, assuming you can get it working and it's sufficiently widespread 
you trust it.

That the people writing the *paper* didn't write it in a convincing way 
doesn't really say much about the *code*.

-- 
Darren New / San Diego, CA, USA (PST)
  Helpful housekeeping hints:
   Check your feather pillows for holes
    before putting them in the washing machine.


Post a reply to this message

From: andrel
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 16:02:03
Message: <486D3071.9050802@hotmail.com>
Invisible wrote:
> Weeeee....
> 
> http://eprint.iacr.org/2008/166.pdf
> 
> There's nothing like cryptanalysis to make you paranoid! ;-)
> 
It lead to a discussion in parliament here and a bad time for one of our 
ministers. Introduction of the country-wide OV chipcard (OV is the 
abbreviation for public transport) is postponed now.

At the last election in some cities voting was done again by paper and 
red pencil because somebody showed that you could listen to what people 
voted by putting a radio receiver close to it and a few more 
insecurities of the digital voting machines.

What these examples have in common is that they were badly designed and 
they relied on people not knowing the details as an important security 
measure. The latter is of course an absolute sin in cryptography, but 
apparently not (yet) when designing voting equipment or identification 
cards.


Post a reply to this message

From: Orchid XP v8
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 17:06:48
Message: <486d3f68$1@news.povray.org>
andrel wrote:

> What these examples have in common is that they were badly designed and 
> they relied on people not knowing the details as an important security 
> measure. The latter is of course an absolute sin in cryptography, but 
> apparently not (yet) when designing voting equipment or identification 
> cards.

Security through obscurity = hmm, it doesn't work. ;-)

-- 
http://blog.orphi.me.uk/
http://www.zazzle.com/MathematicalOrchid*


Post a reply to this message

From: Orchid XP v8
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 17:08:29
Message: <486d3fcd@news.povray.org>
Darren New wrote:

> That the people writing the *paper* didn't write it in a convincing way 
> doesn't really say much about the *code*.

True. But given that it seems to be a one man project... Well I'm sure 
it *works*, but that's not the same as being secure. [Not that any sane 
person is going to bother trying to hack my systems unless it's 
sufficiently easy.]

-- 
http://blog.orphi.me.uk/
http://www.zazzle.com/MathematicalOrchid*


Post a reply to this message

From: Darren New
Subject: Re: Fun with cryptography
Date: 3 Jul 2008 17:29:35
Message: <486d44bf$1@news.povray.org>
Orchid XP v8 wrote:
> True. But given that it seems to be a one man project... 

I see. I hadn't followed it up.  No, if the author of the code is the 
author of the paper, I'd definitely go with IPSEC. :-)

-- 
Darren New / San Diego, CA, USA (PST)
  Helpful housekeeping hints:
   Check your feather pillows for holes
    before putting them in the washing machine.


Post a reply to this message

From: Invisible
Subject: Re: Fun with cryptography
Date: 4 Jul 2008 04:08:07
Message: <486dda67$1@news.povray.org>
>> True. But given that it seems to be a one man project... 
> 
> I see. I hadn't followed it up.  No, if the author of the code is the 
> author of the paper, I'd definitely go with IPSEC. :-)

It appears the report was written by somebody other than the author. But 
then, comments like "OpenVPN seems to be using SSL" make me suspicious. 
As does the fact that SSL and TLS both run over TCP, yet OpenVPN seems 
to be using UPD. That looks like a big enough deviation from the 
standard that I'm left wondering how many design decisions have been 
made with potential security implications.

It's not like OpenVPN just calls the OpenSSH crypto library to do its 
bidding; it looks like a complete new implementation.

-- 
http://blog.orphi.me.uk/
http://www.zazzle.com/MathematicalOrchid*


Post a reply to this message

From: Jim Henderson
Subject: Re: Fun with cryptography
Date: 4 Jul 2008 05:22:11
Message: <486debc3$1@news.povray.org>
On Fri, 04 Jul 2008 09:08:07 +0100, Invisible wrote:

> It appears the report was written by somebody other than the author.

That sentence made me laugh.  Of course, it's 3 AM here (almost 3:30), so 
I'm a little sleepy, but can I just say THANK YOU?  I *really* needed a 
laugh.

Tough night, and this really helped.

Thank you.

Jim


Post a reply to this message

<<< Previous 4 Messages Goto Latest 10 Messages Next 10 Messages >>>

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.