Encryption Matters, Part Deux 40
dlc writes "I'm sure Rusty has already submitted this, but just in case he hasn't, part 2 of "Encryption Matters" is now available on Kuro5hin.org. Part 1 was featured on Slashdot last week, and, if the lack of trolling is any indication, was well-received. "
different encryption methods (Score:2)
just a thought. I don't think it's very feasible now, but maybe in a few years...
Re:different encryption methods (Score:2)
The chipset is proprietary, and the data cannot be read by another AS/400. If you try to remove the drives etc from the unit, they will not function! Conversely, if you add more drives, you have to know the master key to get them to function...as well if you replace these chips, the unit will not function.
Might be worthwhile to port Linux to one of these boxes! Bonus points for the student!
Re:different encryption methods (Score:3)
Sure, OpenBSD [openbsd.org]. (Super simplified history coming up.) Several years ago, they took the FreeBSD [freebsd.org] source tree and began combing it for insecurities and weaknesses. It now ships very tightly closed up by default, with most daemons off, SSL and SSH included as part of the core OS, etc. They haven't gone to the lengths you describe (I don't think), mainly because they need to maintain POSIX compliance and source-level compatibility with other Unixes and *BSD's. Definitely worth looking into if security is your passion.
darren
Cthulhu for President! [cthulhu.org]
Re:different encryption methods (Score:1)
Linux on AS/400? (Score:3)
This would be the most extreme port possible, since the AS/400 security model is directly implemented in hardware. 64-bit native addressing, and the addresses include the drive space. Fully object oriented, again supported in the hardware. Check this site [ibm.com] for info.
...phil
It's a Good basic introduction (Score:2)
though I'd like to see Diffie-Hellman Key Exchange mentioned, and some coverage of the Web Of Trust and other key-cert approaches.
The big thing it needs is pointers to other resources - things like pgp.com, counterpane.com and Bruce Schneier's Applied Cryptography book, the Cypherpunks Archive [inet-one.com], Ron Rivest's pages, and of course digicrime.com.
Correction: OpenBSD took NetBSD, not FreeBSD (Score:1)
OpenBSD started with NetBSD, not FreeBSD. Agree that if you need top security, they are probably your best free choice.
He's just taunting them. (Score:1)
Even posting a link to an article where they would have had the good majority of posts is just irresponsible for anyone against trolling.
Its a waste for moderaters to post down. They should only be posting upwards not down.
Sigh (Score:1)
Guys that was just ASKING for trouble, now the highest moderated post (at the moment) is God v.20 or some such non sense and there are about 15 trolls on the page.
Other resources. (Score:2)
--
Re:different encryption methods (Score:1)
As for AS/400 Linux... I can't tell you, or I'd have to kill you
Ya, I tried that out a year or so ago... (Score:3)
First, you need a computer that no one can hack into; I recommend a 386 without a network card.
Next, you need to secure the local console so the evil wiley hacker can't break into your computer room and hack from the inside out. Cutting the keyboard cable and taking the ball out of your mouse work nicely.
Then, what a truly secure machine needs, is a A+ secure OS. MSDOS works well. "But", you say, "MSDOS has just about the WORST level of security imaginable!!". Well, then I suggest you remove any possible places to store malicious code so the OS doesn't have to be all that secure. Remove the RAM, Floppym CDROM and Hard disk.
There! A truly secure machine, without, and I think people will agree, a single security hole in it.
;) Chris
*ps - for those of you that feel the need to point anything out, please place all comments in the round file in the corner, thanks!*
Re:He's just taunting them. (Score:1)
this article annoys me (Score:4)
"The solutions to the problems of shared secret exchange and weak encryption are actually quite simple."
In theory, the solutions are indeed simple, but securely implementation of the algorithms and the correct protocols to use are actually very intricate. For example, the article completely fails to mention man-in-the-middle interception and relay attacks on public key cryptosystems, nor does the article mention the importance of padding, the prevention of replay attacks on one-time nonces, and the dangers of chosen signature attacks. The article presents just enough detail that a reader might believe that the topic is covered throughly, but not enough implementation guidance that a naive reader would be able to use the information given in a reasonable secure manner.
"Additionally, the private key can be used to encrypt things. This allows anyone with the matching public key to verify the author's identity."
NO!!! The private key can be used to encrypt *only nonces that the owner of the private key can control* (message hashes and the like). This signed hash allows anyone with the corresponding public key to *verify that the hash was not modified in transit*; it says absolutely nothing about the author's identity, nor does it authenticate the contents of the message signed, beyond that the message was signed by a person possessing the corresponding private key and was not changed such that the contents hashed were modified.
"Given two cipher texts that have some form of key overlap, all a cryptanalyst has to do is "slide" them around until the number of coincidences suddenly jumps."
The method of Kasaki superpositions would not be used to solve two different messages encrypted with the same pad. Rather, one would XOR the two messages together at different offsets and compute what is known as the "text autocorrelation function" (Shannon roughness). Subsets of the XORed messages would be tested with the ACF until a certain subset more resembled English text. The I of C method does *not* apply in this case, because the assumption of multiple messages encrypted in the same polyalphabetic glyph set does not hold.
"It is known by many names; message digest, fingerprint, cryptographic checksum, contraction function, manipulation detection code (MDC), and message integrity check (MIC)."
These words are not neccesarily synonymns; it is a very sloppy use of these technical terms to use them interchangeably. A message digest refers to the output of a hash function on a specific message. A fingerprint usually refers to the output of a hash function on a specific asymetric key. A cryptographic checksum is not defined in any general usage; usually, it would mean the same as a message digest, but one would not be sure. A contraction function does not exist; compression functions do, but they are used within cryptographic hash functions in the Meyer-Damgard model of collision resistance. The terms "manipulation detection code (MDC), and message integrity check (MIC)" are not in common use, nor are their acronyms. The author may be referring to Message Authentification Codes (MACs), which are essentially keyed cryptographic hash functions.
"Also, a one-way hash function, when properly designed, will not give the same hash value for two different preimages"
The pigeonhole principle necesitates that there will be collisions once the preimage size exceeds the size of the hash value. Indeed, if the hash function is a "perfect" hash function, it will approxiamate a random function, not a random permutation on the inputs. One would expect to find a collision after 2^(hash length/2) tested preimages due to the birthday paradox.
"If your password is not something simple like an english word, it is probably secure."
NO!!! Unless your password has over 40 bits of entropy (about a random alphabetical 8 letter password, about 3 randomly selected
"By now you should have a good understanding of the fundamental concepts of encryption."
If you read just this article, you would have a flawed understanding of the "fundemental concepts of encryption," but you would believe that you *did* understand it. A little knowledge is sometimes a very dangerous thing. Any serious cryptographic implementor should definitely buy _Handbook of Applied Cryptography_ by Menezes, et. al., _Applied Cryptography_ by Schiener, and _Codebreakers_ by Kahn (for historical background).
Re:different encryption methods (Score:3)
If I'm parsing this correctly, it seems as if it would be essentially impossible for any system with a GUI to realistically be certified A1. One must have a mathematical proof of correctness of the same attributes as B1, B2 systems in order to be certified A1; the mere fact that a mouse can be moved, with all that entails (cutting/pasting, etc.), means *massive* overhead to keep track of Mandatory Access Control (the standard secrecy++, permissiveness-- model would impose insane amounts of bookkeeping to make sure every operation was permissible). Perhaps with the capabilities scheme (ex. Eros OS) could be extended to offer A1 level security, with a reasonable amount of implementation assurance, but it still seems very difficult to get the IOP flow done efficiently and securely. It's an interesting project, and I would love to hear more about it if you ever get started.
Re:Sigh (Score:2)
Yeah, I was kind of hoping it would be edited a bit before it got posted...
The only solution is to moderate everything else in this discussion up. :)
darren
Cthulhu for President! [cthulhu.org]
true, but... (Score:3)
If you knew nothing about encryption, and read this article, you'd at least have an idea what people meant when they said "One time pad" or "public key". I should hope that no one is going to read this and go out and try to implement an algorithm! Being able to do that would take *way* more learning than we can possibly hope to offer.
--
Re:true, but... (Score:3)
Re:Ya, I tried that out a year or so ago... (Score:2)
100% security makes computers too hard to use. A better solution would be to make it cost more to get the data than the data is worth. An example of what NOT to do is to put code-word (higher than top secret) information on a Laptop computer, and then leave the laptop in a conference in the state department. That's what was just reported in the newspaper.
The more sensitive data, the more security required. Something along the lines of the security our nuclear arsenal is what code-word classification should be given. That means, it never gets onto a laptop computer, and it can never be accessed unless the consent of, say, a dozen 4 star generals is given by a physical act (turning a key).
Re:Ya, I tried that out a year or so ago... (Score:1)
-----------------------
Re:ATTN: KURO5HIN.ORG DELETES POSTS (Score:1)
And if both your parents are dead, my condolences. Losing a loved one sucks more than anything else.
--
deleteing posts (Score:1)
--
Calm down.... (Score:1)
And? It's 'his' site (OK, I don't know the sex of the site owner).
Re:deleteing posts (Score:1)
Come on Rusty, you can't tell me you didn't laugh your ass off at that! I know I was cracking up just from reading it in your post!
To be completely honest, you may want to amend your statement about what kind of posts you delete to include duplicates... just to be completely honest.
Yet I wonder, since I agree that deleting trolls is usually the best decision, what will you do if k5 becomes huge and there are more trolls than you can handle? I suppose this is a more appropriate topic for posting on k5 itself, but it's not worth an entire article to itself, and this thread is already wayyyy offtopic.
__________________________________________________ ___
Re:deleteing posts (Score:1)
It was kind of funny, the very first time. But SLIYA in four different articles, and submitted as a story for good measure was waaay too much. And as for scaling, I have a couple options. I may allow users to rate a comment "spam". X number of spam ratings and it goes to "potential spam purgatory" where admins can review and see if it really is. If it's not, it'll be reinstated, if it is, it just decays away. As usual, I prefer to distribute the work as much as possible. :-)
--
Re:different encryption methods (Score:2)
See this link: comments from IBM employees to the "Linux on AS/400" project [snip.net].
And, of course, the project page itself [snip.net].
Good luck. Personally, I think the effort would be better spent trying to write an application emulation layer, instead of porting the whole OS, but it's no skin off my nose since I won't be on either project.
Re:different encryption methods (Score:1)
General rule of thumb, the simplier the system, the easier it is to make secure. I'm not aware of any "completely secure OS", but I don't hang around military types.
The hardware-security-module (probably the most "secure" things in the consumer market) don't actually require a secure OS, if they are designed, manufactured, and updated carefully. One of the reasons they are secure, is because they just don't do that much. Security can benifit from simplicity.
Offtopic: It is kind of funny to see the mindet change when a "software crypto" programmer starts to use a HSM. They want access to the raw crypto routines (because that was the way they did things before). Trouble is, raw access is generally not secure (OK, there are a number of ways around it, but I did say "generally").
True (Score:1)
Sorry if my original post looks confused, I had a great one but somehow it got butchered between my browser and slashdot's server.
I didn't like the mean-spiritedness of the original poster myself, and I personally thought that the person had a lot of nerve getting offended at a reply to a troll post as if the original troll post is hunky-dory. No one knew about the parental situation as it is until it was stated, so really it couldn't have been meant to be offensive, therefore it usually isn't worth the time being offended about it. No one really knows if that situation is even true, given the anonymity of AC's on Slashdot, it's easy to just say it even if it weren't true to fish an apology out of another poster.
Re:ATTN: KURO5HIN.ORG DELETES POSTS (Score:1)
--
Re: Snowcrash question. (Score:1)
---
Re:different encryption methods (Score:1)
I would love to see you contribute. (Score:2)
Your "critisms" remind me a lot of the same "critisms" that "Beginning Security" parts 1 [kuro5hin.org] and 2 [kuro5hin.org] brought. They didn't mention a single thing about auditing code, probing firewalls, setting up security policies, etc. If you look at the feature box on K5, you'll see those went under different headings ("Security the Border," "Bullet Proof Code," etc).
What I'm doing is trying to help some of the newbies to become more clueful, and help others avoid problems. Once they've mastered the material, or at least have a basic understanding of the problem, they can move on to the more advanced stuff.
---
Re:different encryption methods (Score:1)
Re: Snowcrash question. (Score:1)
--
Re:different encryption methods (Score:2)
Of course they could just walk down the hall and talk to each other.
Re:different encryption methods (Score:1)
A general-purpose "secure OS" is a pipe-dream (IMO, of course). Hardware is cheap -- why bother...
Re:different encryption methods (Score:1)
What you're talking about is called steganography, which is the art of hiding data in other data.
Which is a very good way of hiding your information... But would seem out of place in top level security places. I mean, where am I going to hide my really really secret data... Well... I could hide it in my really secret data, then put it all in my not-so-really secret data...
Unless you have some meaningless data that seems completely irrelevant to what you're hiding, then it becomes a bit pointless. And with top secret data, you're not likly to store it next to something pointless.. Like oh say some pictures of Natalie Portman...
Neurotic: Person who builds forts in the sky
Psychotic: Person who lives in those forts
Re:different encryption methods (Score:1)
Monitoring system load and process activity are administrative tasks. An operating system could restrict a user's ability to perform these tasks, e.g. not display load averages, only allow users to view stats on their own processes, etc.
This type of data transfer is called a "covert channel," in other words, an unusual or unorthodox method of transferring data, where it's not obvious that data is being transferred at all. Steganography, for instance, creates a covert channel for data within images to which it is applied. This is distinguished from an "overt channel" where it is obvious that data is being transferred. Examples of this include FTP, sneaker net, telephone calls, etc.
Guarding against allowing covert channels to be opened in a system isn't very easy. However, restricting administrative tasks to those with a "need to know" would nearly completely solve the problem, at least within the computer. Now the network is another story.....
---
Re:Ya, I tried that out a year or so ago... (Score:1)
Re:different encryption methods (Score:1)