From: Mok-Kong Shen on
amzoti wrote:
[snip]
> Most stuff on the market today should be called privacy - because it
> is certainly not security.

An average common user is certainly not in a position to know the "real"
quality of a security software. He has no choice but to rely on the
reputation of the producer and assume that nobody (e.g. at the shop)
has done any malicious manipulation on the particular piece he
acquires. BTW, the same is with OS. In the days of Intel's 8080/8086,
the OS was on a large plastic disk and many, who knew the assembler,
could read the entire OS of a PC much like reading a novel. Now with
Windows, where there are such things as automatic connection with
remote sites to download updates and their automatic installation and
with the myriad of virus, trojans (some such are rumored to even stem
from official sides) etc., the real experts, who knows what "exactly"
happens on his computer, are rare, unfortunately.

M. K. Shen
From: Mok-Kong Shen on
Joseph Ashwood:
> "Mok-Kong Shen" wrote:
>> Kerchhoffs' principle requires that one makes use of publicly-known
>> algorithms, if I don't err.
>
> You do err, in the same way that most err is the application of
> Kerchhoff. Kerchhoff's principal in question is that the level of
> security is not affected by publication. In practice this means we
> publish our algorithms so that others can catch our mistakes, the
> publication does nto affect the security but it does improve our
> understanding of the security and so affects our usage and improves our
> security in practice. It is always important to realize that publication
> does not make something secure, just as lack of publication does not
> make something secure.

So it does mean: (1) if one has one's own algorithm, one should publish
it (in order not to have the disadvantage of errors undetected), (2) if
one takes an algorithm from others, one should only take one that is
publicly-known. Taking both these together, it amount to the same as I
wrote above in my humble view.

> To answer your further question, you'll want to take a look at "Cascade
> Ciphers: The Importance of Being First" basically the combined system
> will be at least as secure as the first cipher used.

Even and Goldreich wrote in a paper that a cascade of cipher A with
cipher B is at least as hard to crack as any of its stages indivicually.
It is a stronger result than what you qouted in my view. BTW, it seems
that, except for loss of universal compatibility, one could have
certain (key dependent) permutations of round keys of block ciphers
like AES without adverse effects.

Thanks,

M. K. Shen
From: unruh on
On 2010-01-05, Mok-Kong Shen <mok-kong.shen(a)t-online.de> wrote:
> amzoti wrote:
> [snip]
>> Most stuff on the market today should be called privacy - because it
>> is certainly not security.
>
> An average common user is certainly not in a position to know the "real"
> quality of a security software. He has no choice but to rely on the

That is why insisting on open source security products is important.
Even if you cannot examine the code, someone can, and can report on the
problems. It makes the manufacturer more careful as well.

> reputation of the producer and assume that nobody (e.g. at the shop)
> has done any malicious manipulation on the particular piece he

Bad assumption. You should be able to test it. Whether you do or not is
up to you, but you should be able to.


> acquires. BTW, the same is with OS. In the days of Intel's 8080/8086,
> the OS was on a large plastic disk and many, who knew the assembler,
> could read the entire OS of a PC much like reading a novel. Now with
> Windows, where there are such things as automatic connection with
> remote sites to download updates and their automatic installation and
> with the myriad of virus, trojans (some such are rumored to even stem
> from official sides) etc., the real experts, who knows what "exactly"
> happens on his computer, are rare, unfortunately.

Which again argues for opensource OS as well. If something suspicious
comes up you can check.


>
> M. K. Shen
From: unruh on
On 2010-01-05, Mok-Kong Shen <mok-kong.shen(a)t-online.de> wrote:
> Joseph Ashwood:
>> "Mok-Kong Shen" wrote:
>>> Kerchhoffs' principle requires that one makes use of publicly-known
>>> algorithms, if I don't err.
>>
>> You do err, in the same way that most err is the application of
>> Kerchhoff. Kerchhoff's principal in question is that the level of
>> security is not affected by publication. In practice this means we
>> publish our algorithms so that others can catch our mistakes, the
>> publication does nto affect the security but it does improve our
>> understanding of the security and so affects our usage and improves our
>> security in practice. It is always important to realize that publication
>> does not make something secure, just as lack of publication does not
>> make something secure.
>
> So it does mean: (1) if one has one's own algorithm, one should publish
> it (in order not to have the disadvantage of errors undetected), (2) if
> one takes an algorithm from others, one should only take one that is
Yes, to both. However this is not Kerchoff's principle.

> publicly-known. Taking both these together, it amount to the same as I
> wrote above in my humble view.

No.



>
>> To answer your further question, you'll want to take a look at "Cascade
>> Ciphers: The Importance of Being First" basically the combined system
>> will be at least as secure as the first cipher used.
>
> Even and Goldreich wrote in a paper that a cascade of cipher A with
> cipher B is at least as hard to crack as any of its stages indivicually.

While this may be true in general, it is not true always. Consider
cypher A as DES, and cypher B as DES inverse. The combination is clearly
far less secure than either individually.

> It is a stronger result than what you qouted in my view. BTW, it seems
> that, except for loss of universal compatibility, one could have
> certain (key dependent) permutations of round keys of block ciphers
> like AES without adverse effects.

One could, or one could weaken it. It depends on what you do. But you
should assume that your opponent knows what you did. Ie, it does not
strengthen the cypher even in the best of cases.
And since your knowledge of crypto is not as good as the people who
designed AES, the chances that you unkowingly weaken it is relatively
high.

Secrecy of the cypher IS a form of security defense. But it should not
be relied on. IF you use your cypher only with one other person, it may
be a very good defense. If you use it with hundreds, it is a bad
defense, because someone will leak the details to your opponent-- by
accident or design.



>
> Thanks,
>
> M. K. Shen
From: Mok-Kong Shen on
unruh wrote:
[snip]
> Which again argues for opensource OS as well. If something suspicious
> comes up you can check.

I doubt that an average normal user is in a position (has the knowledge
and time) to check that a file of an opensource OS he downloaded from
somewhere is absolutely ok, in the sense of free from manipulations.
Similarly, he can't know whether a piece of hardware he acquires is ok.
Of course, the probability of bugs should be negligible in general, but
it might not be exactly zero under some rather unusual contexts (e.g.
where one or one's organization is the target for manipulations for
some reasons), I would surmise.

M. K. Shen