[Cryptography] [FORGED] Re: Escrowing keys
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Tue May 2 19:46:55 EDT 2017
Phillip Hallam-Baker <phill at hallambaker.com> writes:
>In their world it isn't
>
>Confidentiality Integrity Availability
>
>It is:
>
>Confidentiality << Integrity < Availability
I would say it's more:
Availability && ( Integrity >> Confidentiality )
with the '&&' in the shell-script sense, i.e. first you ensure availability,
then once that's done you move on to any other stuff. Sean Smith gives a
great example in his newest book of a vendor who advertises that their
hardcoded default password is more complex than other vendors'. This make
sense, you don't want availability impacted by lack of access, but if you've
got a hardcoded default password then making it complex protects you from
endless random scanning attacks, you have to actually perform a targeted
attack to get in.
(I'm sure several readers' heads will have exploded trying to think that one
through :-).
Peter.
More information about the cryptography
mailing list