From: unruh on
On 2010-01-05, Mok-Kong Shen <mok-kong.shen(a)t-online.de> wrote:
> unruh wrote:
> [snip]
>> Which again argues for opensource OS as well. If something suspicious
>> comes up you can check.
>
> I doubt that an average normal user is in a position (has the knowledge

You did not read. Although that particular user might not be capable,
others are, and with opensource ANYONE can check.Because the manufacurer
knows this they are liable to be more careful to get everything right.

> and time) to check that a file of an opensource OS he downloaded from
> somewhere is absolutely ok, in the sense of free from manipulations.
> Similarly, he can't know whether a piece of hardware he acquires is ok.
> Of course, the probability of bugs should be negligible in general, but
> it might not be exactly zero under some rather unusual contexts (e.g.
> where one or one's organization is the target for manipulations for
> some reasons), I would surmise.

If one has an organization one is hardly "the average normal user" and
the chances taht someone can actually check is much much higher.

And you do not have to accept what is delivered, you can download from
elsewhere instead, and say, run diff to see what the differences are.
>
> M. K. Shen
From: WTShaw on
On Jan 5, 12:14 pm, unruh <un...(a)wormhole.physics.ubc.ca> wrote:

>
> Secrecy of the cypher IS a form of security defense. But it should not
> be relied on. IF you use your cypher only with one other person, it may
> be a very good defense. If you use it with hundreds, it is a bad
> defense, because someone will leak the details to your opponent-- by
> accident or design.
>
Which takes you back to the key(s), then there are two good rules:
1) Protect the source of the key so that even if you get it by hook or
crook any future keys are kept obscure.
2) Don't betray your key(s) with a from of encryption that utilizes
the whole key. It is better to use an algorithm that never uses key(s)
in a simpleton manner.

Got it? Protect sources. Protect methods; let's call that the Valerie
Protection Protocol
From: Mok-Kong Shen on
unruh wrote:

> And you do not have to accept what is delivered, you can download from
> elsewhere instead, and say, run diff to see what the differences are.

I certainly believe that opensource is extremely fine. My point is that
one should nonetheless not equate that to "perfectness". For otherwise
there wouldn't have been a need for a rigorously proved kernel
(according to a recent news there was such a task done, involving
considerable effort). Further, if my memory is right, one of the UNIX
creators after long years revealed a backdoor that was detected by
nobody else.

M. K. Shen

From: David Eather on
WTShaw wrote:
> On Jan 5, 12:14 pm, unruh <un...(a)wormhole.physics.ubc.ca> wrote:
>
>> Secrecy of the cypher IS a form of security defense. But it should not
>> be relied on. IF you use your cypher only with one other person, it may
>> be a very good defense. If you use it with hundreds, it is a bad
>> defense, because someone will leak the details to your opponent-- by
>> accident or design.
>>
> Which takes you back to the key(s), then there are two good rules:
> 1) Protect the source of the key so that even if you get it by hook or
> crook any future keys are kept obscure.
> 2) Don't betray your key(s) with a from of encryption that utilizes
> the whole key. It is better to use an algorithm that never uses key(s)
> in a simpleton manner.
>
> Got it? Protect sources. Protect methods; let's call that the Valerie
> Protection Protocol

Who is Valerie?

What did they do in this field? (I'd just like to know - see, I know of
Kerchhoff and his principle so I know why he is worth listening to and
what he said - I would like to know the same about Valerie)
From: Mok-Kong Shen on
WTShaw wrote:
> unruh wrote:
>>
>> Secrecy of the cypher IS a form of security defense. But it should not
>> be relied on. IF you use your cypher only with one other person, it may
>> be a very good defense. If you use it with hundreds, it is a bad
>> defense, because someone will leak the details to your opponent-- by
>> accident or design.
>>
> Which takes you back to the key(s), then there are two good rules:
> 1) Protect the source of the key so that even if you get it by hook or
> crook any future keys are kept obscure.
> 2) Don't betray your key(s) with a from of encryption that utilizes
> the whole key. It is better to use an algorithm that never uses key(s)
> in a simpleton manner.
>
> Got it? Protect sources. Protect methods; let's call that the Valerie
> Protection Protocol

I think it would be fine to never "directly" use one's (master) key but
use it to derive keys for encrpting the individual messages through (1)
using it to encrypt time and message no. etc. with e.g. a block cipher
or (2) extending it with such data in case the cipher accepts keys of
variable length. One could also (hierachically) derive from a master
key sub-master keys for use in certain specific time periods (year,
month etc.) as a further measure to protect the master key. For a block
cipher, one could further use the message key in counter mode to
generate keys for actually encrypting the individual blocks to defeat
differential and algebraic analysis, as I recently suggested in another
thread.

M. K. Shen