By no means I claim to be an expert, but what I feel is that ENISA's
report is missing recommendations for TLS key exchange algorithms. I
would except this report to recommend algorithms that achieve forward
secrecy. In any case I found the report very comprehensive and well
suited for an engineer.

Best,
Nikos

On Mon, Nov 4, 2013 at 11:39 AM, Paterson, Kenny
<kenny.pater...@rhul.ac.uk> wrote:
> Peter,
>
> (Full disclosure: I was one of the external reviewers of this report.)
>
> I take your point that there is a gap between cryptography and security
> engineering, and I understand the gap well from first-hand experience,
> first from my time in industry and more recently as a consultant to
> industry.
>
> You are quite right that PKCS#1v1.5 is very widely used and widely
> supported in developer libraries. But that does not mean it should
> continue to be used forever, especially in view of the fact that it has
> been repeatedly broken (in a practical sense) in different application
> scenarios. Let me know if you want the list of papers showing this - but
> you could start by re-reading Bleichenbacher's "million message attack"
> paper from Crypto 1998, and then the more recent paper by Bardou et al.
> from Crypto 2012 (slides here:
> http://www.iacr.org/conferences/crypto2012/slides/11-1-Steel.pdf).
> PKCS#1v1.5 makes a great example of why theoretical weaknesses should not
> be ignored: attacks that start off that way generally only get stronger
> with time.
>
> So what are we to do? Continue to recommend something that is
> cryptographically dreadful simply because everybody is using it? Or to try
> to kickstart the process of breaking with the past? My view is that the
> latter is the right course of action. And a report like this is an
> opportunity to do so. It provides a lever for crypto engineers to start
> pushing for more cryptographically robust solutions.
>
> You mention SSL/TLS and the billions of devices and apps using it.
> Interesting case study. By your argument, we should continue to use RC4 or
> MAC-then-encrypt in that protocol, since, hey, everybody is using them,
> they are good enough, and we can patch against the currently known
> attacks. Interesting exercise in double-think to try to reconcile that
> with your proposals over on the TLS mailing list (specifically
> draft-gutmann-tls-encrypt-then-mac-00.txt). What gives?
>
> By the way, I think you should write your proposed report. Or lobby for
> some body like ENISA to commission it.
>
>
> Cheers
>
> Kenny
>
> On 04/11/2013 00:40, "Peter Gutmann" <pgut...@cs.auckland.ac.nz> wrote:
>
>>Sandy Harris <sandyinch...@gmail.com> writes:
>>
>>>Cited in a comment on Schneier's blog:
>>>https://www.schneier.com/blog/archives/2013/10/nsa_eavesdroppi_2.html
>>>
>>>Register article with link to actual report:
>>>http://www.theregister.co.uk/2013/10/31/most_security_protocols_insecure_
>>>suggests_enisa/
>>
>>The original paper was written by some very smart cryptographers.  And
>>that's
>>the problem, it was written by cryptographers, not security engineers.
>>If I
>>wanted to run crypto on a whiteboard, I'd definitely follow the
>>recommendations in the paper.  However, looking at systems deployed in
>>practice... well, I'll refer people to the Crypto Gardening Guide and
>>Planting
>>Tips, http://www.cs.auckland.ac.nz/~pgut001/pubs/crypto_guide.txt, and in
>>particular Questions I and J and the Final Thoughts.
>>
>>Beyond that, there are other problems with the recommendation.  For
>>example it
>>strongly recommends DLP algorithms over RSA.  DLP is great on a
>>whiteboard but
>>extremely brittle in practice, since the entire family has a distressing
>>propensity to leak the private key if you get even the tiniest
>>implementation
>>detail wrong.  Then it deprecates PKCS #1 v1.5 (which pretty much the
>>entire
>>planet uses) because it doesn't have a security proof, while recommending
>>a
>>bunch of exotic alternatives that more or less nothing uses.
>>
>>So what I'd be interested in seeing in response to this report is another
>>one
>>written by security engineers which makes recommendations on what's
>>practical
>>in real life rather than on a whiteboard.  For example, we have several
>>billion SSL/TLS apps deployed (every PC, laptop, tablet, and smartphone
>>has
>>one, not to mention any number of embdded devices, the figure "several
>>billion" is not an exaggeration), how should we configure those to
>>provide the
>>best security possible?
>>
>>(NB: I am not volunteering to write this report :-).
>>
>>Peter.
>>_______________________________________________
>>cryptography mailing list
>>cryptography@randombit.net
>>http://lists.randombit.net/mailman/listinfo/cryptography
>>
>
>
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to