>Brian Steele [SPICEISLE] wrote:
>> 
>> [copied from a reply made to another member off-list]
>> 
>> >Then you are mistaken.  Security through obscurity has long been
>> >repudiated by knowledgeable security folks,  dating from collquia of
>> >locksmiths and the debates about whether weaknesses in locks should
>> >be kept secret or shared among members of the trade.
>> 
>> My challenge is to define "members of the trade" here.  We're not
>> talking about locks, but software, which by its very nature is easily
>> transportable and reconfigurable - and quite easy to duplicate by
>> anyone who has access to a computer and a floppy disk (or CD-RW drive
>> :-)).   Also, if a hacker, by perusing the "open" architecture for a
>> security product, chances upon a flaw, then can we rely on him to
>> report the flaw to the producer, or more likely use it for his own
>> profit?
>
>The "trade" here refers to cryptography as far as I'm concerned,
>and it is irrelevant if it is implemented in HW, SW or something
>else. And an open architecture hopefully gets peer-reviewed, so
>mistakes may actually be found rather than hushed up.
>
>Try reading something on the history of cryptography. Such as
>why attempts to make public-key systems based on knapsacks
>are vulnerable (a theoretic result), and not implemented in
>practice.
>
>-paul
>-

A little 'history' on cryptography. 
Havent looked at it much myself, just thought id bring it to your 
attention, Paul.

http://www.fortunecity.com/skyscraper/coding/379/lesson1.htm

- neotek

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to