[Cryptography] Quillon Graph

Peter Fairbrother peter at tsto.co.uk
Fri Jan 16 22:55:24 EST 2026


On 15/01/2026 13:55, Peter Gutmann via cryptography wrote:
> Peter Fairbrother <peter at tsto.co.uk> writes:
> 
>> The laws of secure system design:
>>
>> 1 Someone else is after the stuff you have
> 
> Your mum may love you but everyone else really isn't that interested in you.
> You may be unlucky enough to get caught up in someone's driftnet, but that's
> about it.

Yep - but someone might want to trawl your stuff. Or, like NSA, all of 
everybody's stuff.

Or even your Mum or baby sister (don't ask) might want to get a look at 
your stuff, and you don't want her to.
> 
>> 3 Everywhere can be attacked
> 
> Unless it's on the public Internet, people won't even know it exists, let
> alone try and attack it.

I originally meant the law to be taken as - the storage can be attacked, 
the keying, the cryptography, the implementation, the communications 
etc. etc..

But suppose you have an offline plaintext file which is hidden - you 
have to hide it somewhere, and that somewhere can be attacked.

Now if no-one knows where it is, or even that it exists, it will be hard 
for people to attack it - but perhaps someone gets lucky, or just looks 
everywhere. Or even just everywhere you might hide it.

>> 9 Security is a Boolean
> 
> Security is a floating-point value.  Most of the time all you need to be is
> just good enough.
Can't agree with that at all.

I gave my argument for considering security to be a boolean before, but 
in other circumstances or for other reasons maybe security can be 
considered as a matrix of 1's and 0's with eg different attacks as rows 
and effort as columns - or some other multi-valued construct - but never 
as a simple scalar.

> Also:
> 
> 11. "Don't be a target" is the best security measure you have.

Not sure it's the best, it's kinda fragile. And kind of hard to do reliably.

Note, that would be a method, not a law. I call them laws because, like 
the laws of physics,  they cannae be broken.
> (Rule 11 ties in to all the other variations above.  If you can't comply with
> 11, i.e. your threat model is James Mickens "Mossad doing Mossad things to
> you" then you're going to get compromised no matter what you do).

Point - and yet people do resist forcible interrogation. Even if it's by 
using a cyanide-filled tooth (not really, you can't get enough cyanide 
in a fake tooth - but there are other poisons which would do the job).


Peter F


More information about the cryptography mailing list