On Mon, Jun 30, 2008 at 11:47:54AM -0700, Allen wrote:
> Nicolas Williams wrote:
> >On Mon, Jun 30, 2008 at 07:16:17AM -0700, Allen wrote:
> >>Given this, the real question is, /"Quis custodiet ipsos custodes?"/ 
> >
> >Putting aside the fact that cryptographers aren't custodians of
> >anything, it's all about social institutions.
> 
> Well, I wouldn't say they aren't custodians. Perhaps not in the 
> sense that the word is commonly used, but most certainly in the 
> sense custodians of the wisdom used to make the choices. This is 
> exemplified by Bruce Schneier, an "acknowledged expert,"  changing 
> his mind about the way to do security from "encrypt everything" to 
> "monitor everything." Yes, I have simplified his stance, but just to 
> make the point that even experts learn and change over time.

What does that have to do with anything?  Expert != knowledge cast in
stone.

> >There are well-attended conferences, papers published online and in many
> >journals, etcetera.  So it's not so difficult for people who don't know
> >anything about security and crypto to eventually figure out who does, in
> >the process also learning who else knows who the experts are.
> 
> Actually I think it is just about as difficult to tell who is a 
> trustworthy expert in the field of cryptography as it is in any 
> field of science or medicine. Just look at the junk science and 
> medical studies. One retrospective study of 90+ clinical trials 
> found that over 600 potentially important reaction to the drugs 
> occurred but only 39 were reported in the papers. I suspect if we 
> did the same sort of retrospective study for cryptography we would 
> find some similar issues, just, perhaps, not as large because there 
> is not as much money to be made with junk cryptography as junk 
> pharmaceuticals.

The above does not really refute what I wrote.  It takes effort to
figure out who's an expert.  But I believe that the situation w.r.t.
crypto is similar to that in science (cold fusion frauds were identified
rather quickly, were they not?) and better than in medicine (precisely
because there is not much commercial incentive to fraud here; there is
incentive for intelligence organizations to interfere, I suppose, but
here the risk of getting caught is high and the potential cost of
getting caught high as well).

> I'm curious, how does software get sold for so long that is clearly 
> weak or broken? Detected, yes, but still sold like Windows LANMAN 
> backward compatibility.

I thought we were talking about cryptographers, not marketing
departments, market dynamics, ...  If you want to include the latter in
"custodes" then there is a clear custody hierarchy: the community of
experts in the field is above individual implementors.  Thus we have
reports of snake oil on this list, on various blogs, etc...

So we're back to "quis custodiet ipsos custodes?"  Excluding marketing
here is the right thing to do (see above).  Which brings us back to my
answer.

> >When it comes to expertise in crypto, Quis custodiet ipsos custodes
> >seems like a relatively simple problem.  I'm sure it's much, much more
> >difficult a problem for, say, police departments, financial
> >organizations, intelligence organizations, etc...
> 
> Well, Nico, this is where I diverge from your view. It is the 
> "police departments, financial organizations, intelligence 
> organizations, etc..." who deploy the cryptography. Why should they 

In my experience market realities have much more to do with what gets
deployed than the current state of the art does; never mind who the
experts are.  "We'd love to deploy technology X, but in our
heterogeneous network only one quarter of the vendors support X, and
only if we upgrade <large number> systems, which requires QA testing,
which..." -- surely you've run into that sort of situation, amongst
others.  Legacy, broken code dwarfs snake oil in terms of deployment;
legacy != snake oil -- we're allowed to learn, as you yourself point
out.

Nico
-- 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to