[Cryptography] asymmetric attacks on crypto-protocols - the rough consensus attack

ianG iang at iang.org
Tue Aug 4 09:39:21 EDT 2015


On 2/08/2015 16:56 pm, Dan McDonald wrote:
> On 1 August 2015 at 21:27, ianG <iang at iang.org> wrote:
>> Can anyone suggest a way to get around this?  I think this really puts a
>> marker on the map - you simply can't do a security/crypto protocol under
>> rough consensus in open committee, when there is an attacker out there
>> willing to put in the resources to stop it.
>>
>> Thoughts?
>
> It's a problem, like terrorism is a real problem.  ALSO like terrorism, the mere threat of such a problem can be used by people with strong NIH infections to push their own terrible alternatives simply by waving the threat of the "rough consensus attacker" around.
>
> This has happened in Real Life before, and it will happen again.  It doesn't diminish the actual problem of a rough-consensus attack, but the concept is rife for hiding other abuses.  (Were I real tinfoil-hat-wearer, I might argue a rough consensus attacker would use NIH fanatics as a second prong.)



This is a good point.  Were I to start accusing of a rough consensus 
attack on some WG, I'd probably be assisting that very same rough 
consensus attack...

NIH == not invented here?  Yes, I see that.



iang



More information about the cryptography mailing list