[Cryptography] Cipher death notes
bear at sonic.net
Fri Apr 3 15:10:11 EDT 2015
On 04/03/2015 08:36 AM, Phillip Hallam-Baker wrote:
> 1) A cipher becomes unfit for use long before a it is possible to
> perform the hardest attacks. SHA-1 has not been broken, even MD5 is
> not completely broken. It will never be possible to extract a DES key
> used to encrypt a random plaintext. etc.
Right. Before there's an actual attack that someone can really
perform, there is still time to consider options and reach
consensus. That dam has not yet broken, and there are not
yet millions of tons of water sweeping down on the homes of
> 2) What do you do if the note is activated?
If the note can appear, then the dam has utterly and completely
broken. The disaster has happened, and the foundations of
the homes of the innocents are already underwater. And the
The note is not the broken dam, nor is it the flood. The note
is not the disaster, the note is somebody who is both sounding
the flood warning sirens and trying to pile sandbags into the
breach. At that point you are doing emergency response.
There is no more time to consider or plan or anything else. At
that point grit your teeth and pitch in with all the other
first responders and good samaritans to do everything you can
for the imperiled and the survivors.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the cryptography