ciphergoth: (Default)
[personal profile] ciphergoth
I've posted before about the generally dreadful nature of cryptographic products. Yesterday I got into an argument on bloody Slashdot with a developer about whether he should try to use good crypto or not. Now, unlike [livejournal.com profile] jwz I can see that he's not the only one with attitude in this thread, but the result still gets me down.

http://slashdot.org/comments.pl?sid=195651&cid=16032881

Next time you use something that uses crypto, bear in mind that it was probably written by the likes of this guy.

Date: 2006-09-04 05:56 am (UTC)
From: [identity profile] brad.livejournal.com
You don't know my system and I like it that way. Nobody but me should know my system! Explaining it's just too hard.

defensive shields up!

Date: 2006-09-04 08:52 am (UTC)
From: [identity profile] trythil.livejournal.com
That exchange was awesome.

In a sad way.

Date: 2006-09-04 09:14 am (UTC)
calum: (Default)
From: [personal profile] calum
Doing encryption well in an embedded system is not hard. It's just a case of choosing the right approach for the CPU/memory requirements you have. And he's got a hardware accelerator! Sheesh!

There is a certain amount of that sort of attitude among embedded system programmers I have known - very much a "I have to code in less space and less cycles than you, therefore dont try to question how I do things".

Theres very much a "it's not possible to do X in an embedded system" attitude floating around, which usually turns out to be false. I had the same argument about writing object-oriented code for embedded systems. Everyone said "you cant do that. It doesnt work in embedded systems. It'll be too slow". Turns out the answer is.. "Not if you do it right".

Date: 2006-09-04 09:48 am (UTC)
From: [identity profile] ciphergoth.livejournal.com
Yes. If this guy has enough cycles to do CBC mode, he has enough cycles for something better.

Date: 2006-09-04 11:23 am (UTC)
From: [identity profile] altamira16.livejournal.com
Mistake #1: Reading slashdot comments

Date: 2006-09-04 11:33 am (UTC)
From: [identity profile] ciphergoth.livejournal.com
You've left out

Mistake #2: Replying to them.

and of course

Mistake #0: Reading Slashdot.

Date: 2006-09-05 09:36 am (UTC)
From: (Anonymous)
never argue with an idiot... they bring you down to their level then beat you with experience

Date: 2006-09-04 01:40 pm (UTC)
From: [identity profile] sjmurdoch.livejournal.com
Amusing thread :-)

Perhaps I am missing something, but is there a need for unpredictable IVs? They should be unique, but wouldn't a counter be adequate, assuming you had sufficient locking to ensure no repetition?

On single pass encryption and authentication, I recently was reading about IGE mode, implemented in OpenSSL. It only needs an extra xor over CBC so looks pretty good.

Date: 2006-09-04 01:57 pm (UTC)
From: [identity profile] ciphergoth.livejournal.com
What you say is true about CTR mode. However in CBC mode there's an attack in which the attacker chooses the first block of the plaintext based on the IV, so the proofs of security only work if the IVs are random and unpredictable.

IGE mode has been proposed several times with different names over the years; I proposed it about nine years ago and called it SBC, then discovered that Michael Brown at Dublin University had proposed it about eighteen months earlier and called it X-CBC. ABC seems to be an interesting extension. However, many similar attempts to build one-pass authenticated-encryption modes of operation have been broken, and as a result these days people tend to demand a proof of security. All the modes I'm advocating, as well as other patent-encumbered modes such as OCB, come with such a proof. I think it would be foolhardy to opt for a mode that does not have such a proof. The extra cost of GGM over CBC is pretty small - a single multiply in GF(2^128). And unlike CBC, GGM is parallelizable.

Oh no they aren't!

Date: 2006-09-06 10:45 am (UTC)
From: (Anonymous)
You should try reading the paper a little more carefully. It assumes fixed IVs, which is patently dumb.

Re: Oh no they aren't!

Date: 2006-09-06 09:41 pm (UTC)
From: [identity profile] ciphergoth.livejournal.com
Heh - you can tell how carefully I read the paper by the timestamps on my replies. Thanks. I still wouldn't recommend it though; I'd like to see a security reduction first.

Incidentally, I don't usually unscreen anonymous comments; please at least sign with a nom. Thanks!

Date: 2006-09-04 11:29 pm (UTC)
From: [identity profile] ciphergoth.livejournal.com
By the way, just saw your temperature/clock skew result on Light Blue Touchpaper. That is just incredibly cool and scary.

Profile

ciphergoth: (Default)
Paul Crowley

January 2025

S M T W T F S
   1234
5678 91011
12131415161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 4th, 2025 06:14 am
Powered by Dreamwidth Studios