Re: A proposal for secure videoconferencing and videomessaging over the Internet

2000-07-28 Thread R. Hirschfeld

> Date: Fri, 28 Jul 2000 07:35:42 -0700
> From: "James A. Donald" <[EMAIL PROTECTED]>

> "Provably secure" is a word applicable to cyphers, not protocols.  To use 
> it in reference to a protocol is nonsense gibberish.

No, it is just more difficult to establish of protocols than of
primitives because there are more possible attacks to consider.

> When we discuss a protocol, we normally take for granted that the cyphers 
> are strong, irrespective of whether they are provably secure or not.

In fact the ciphers most commonly used in practice have not been
proved secure.  (A widespread misconception is that breaking RSA is as
hard as factoring, which may be true but has not been proved.)

> One can prove that cracking a cypher is as hard as cracking some well known 
> mathematical problem.
> 
> What, however, does it mean to say that a protocol is provably secure?  A 
> protocol is not a cypher, though it uses well known cyphers.

It usually means essentially the same thing, namely that one can prove
that a successful attack of the protocol yields a solution to an
assumed-hard problem.  (Such a proof must establish that all possible
protocol attacks have been taken into account.)  It can also refer to
a complexity-theoretic or information-theoretic analysis of the
protocol relative to an appropriate adversarial model.

There are also formal methods that address the security of protocols,
e.g. BAN logic.  I don't know too much about that stuff except that it
is usually possible to find insecure protocols that pass the tests, so
the techniques are more useful for finding weaknesses in protocols
than for providing convincing proofs of security.





Re: A proposal for secure videoconferencing and videomessaging over the Internet

2000-07-28 Thread Derek Atkins

Actually, no, you can apply "provably secure" to a protocol as well.
Granted, it is usually applied to cryptographic protocols, but that
is still a protocol, not a cryptosystem.  Indeed, one could attempt
to apply "provably secre" techniques to protocols such as Kerberos,
or, in the case of the original post, secure multicast.

I'd still like to see the proof of security, but it's a perfectly
reasonable goal.

-derek

"James A. Donald" <[EMAIL PROTECTED]> writes:

>  --
> James A. Donald:
>  > > I do not understand what is meant by "provably secure"]
> 
> At 09:57 AM 7/28/2000 -0400, Rich Salz wrote
>  > An unfortunate admission for a would-be cryptographer.
> 
> It should have been obvious from the context that you deleted that I was 
> criticizing the use of the word to refer to protocol.
> 
> Multicast is a protocol, not a cypher.  It may well use provably secure 
> cyphers, but that does not make multicast provably secure.
> 
> "Provably secure" is a word applicable to cyphers, not protocols.  To use 
> it in reference to a protocol is nonsense gibberish.
> 
> "Provably secure" means that breaking a cypher is as hard as cracking the 
> underlying one way transformation", which is usually true, and not very 
> interesting, since cypher weakness is separate from protocol 
> weakness.  Cyphers are almost always stronger than protocols, and protocols 
> seldom attacked through their cyphers.
> 
> When we discuss a protocol, we normally take for granted that the cyphers 
> are strong, irrespective of whether they are provably secure or not.
> 
> One can prove that cracking a cypher is as hard as cracking some well known 
> mathematical problem.
> 
> What, however, does it mean to say that a protocol is provably secure?  A 
> protocol is not a cypher, though it uses well known cyphers.
> 
> For example the problem with Verisign is not any weakness in the cyphers, 
> but a weakness in determining true names.
> 
>  --digsig
>   James A. Donald
>   6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
>   f/wePiA4NUqV4TnDEAk3SMnTITqtbXlOE+0v1m/3
>   4r58BUE6S1/oWtoWDbs9VJxhGz07D0ZA1WMhIvFuB
> 
> 

-- 
   Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
   Member, MIT Student Information Processing Board  (SIPB)
   URL: http://web.mit.edu/warlord/  PP-ASEL  N1NWH
   [EMAIL PROTECTED]PGP key available




Re: A proposal for secure videoconferencing and videomessaging over the Internet

2000-07-28 Thread James A. Donald

 --
James A. Donald:
 > > I do not understand what is meant by "provably secure"]

At 09:57 AM 7/28/2000 -0400, Rich Salz wrote
 > An unfortunate admission for a would-be cryptographer.

It should have been obvious from the context that you deleted that I was 
criticizing the use of the word to refer to protocol.

Multicast is a protocol, not a cypher.  It may well use provably secure 
cyphers, but that does not make multicast provably secure.

"Provably secure" is a word applicable to cyphers, not protocols.  To use 
it in reference to a protocol is nonsense gibberish.

"Provably secure" means that breaking a cypher is as hard as cracking the 
underlying one way transformation", which is usually true, and not very 
interesting, since cypher weakness is separate from protocol 
weakness.  Cyphers are almost always stronger than protocols, and protocols 
seldom attacked through their cyphers.

When we discuss a protocol, we normally take for granted that the cyphers 
are strong, irrespective of whether they are provably secure or not.

One can prove that cracking a cypher is as hard as cracking some well known 
mathematical problem.

What, however, does it mean to say that a protocol is provably secure?  A 
protocol is not a cypher, though it uses well known cyphers.

For example the problem with Verisign is not any weakness in the cyphers, 
but a weakness in determining true names.

 --digsig
  James A. Donald
  6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
  f/wePiA4NUqV4TnDEAk3SMnTITqtbXlOE+0v1m/3
  4r58BUE6S1/oWtoWDbs9VJxhGz07D0ZA1WMhIvFuB





Re: A proposal for secure videoconferencing and videomessaging over the Internet

2000-07-28 Thread Rich Salz

> I do not understand what is meant by "provably secure".

An unfortunate admission for a would-be cryptographer.  For what it's
worth, this is a mark against your credibility and might mean that fewer
real crypto types will look at your work.  (And no, I don't qualify as a
crypto type.)
/r$