"Man in the Middle" attacks don't work if the "man in the middle"
don't know how to handle the encrypted data/protocol he is
intercepting.
True, and how do you manage that is not happening?

Can't be happening because the man in the middle can't generate valid data, or alter intercepted data maintaining its validity, if he can't break the encrypt algorithm in time to inject his packets of data.
This is also valid for SSL.

Closed standards are inheritable much more secure than
open standards.
That's nothing but security through obscurity:
http://en.wikipedia.org/wiki/Security_through_obscurity

That's just a theoretic argument, not an undoubted reality.


In this type of projects the use of the of this
standard is wrong. He just don't need the SSL implementation
complexity, nor the result slow to start communication, just to get
his data secure.
I don't know what _he needs, if _you want to invent your own security
standards feel free to do so. SSL/TLS is used and accepted world-wide.

Neither do I, but I'm assuming he only need what a generic data communication service needs in terms of security. Pass data in a way it can't be tampered/understood, if intercepted by someone outside the communication points.

I'm not replying to you, Arno, to be impertinent. Far from that. It's just my opinion that a symmetric keyed algorithm, such as AES or Blowfish, with a clever time volatile salt added to the key, is enough for this case in particular.


--
To unsubscribe or change your settings for TWSocket mailing list
please goto http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

Reply via email to