Cryptographic design vulnerabilities

被引:88
|
作者
Schneier, B
机构
关键词
D O I
10.1109/2.708447
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Popular magazines often describe cryptography products in terms of algorithms and key lengths. These security techniques make good headlines ("Triple DES is much stronger than single DES."). Unfortunately, cryptography isn't so simple: Longer keys do not guarantee more security. Compare a cryptographic algorithm to the lock on your front door. Improving the lock probably won't make your house more secure. Burglars don't try every possible key (the equivalent of a brute-force attack); most aren't clever enough to pick the lock (the equivalent of a cryptographic attack). No, burglars smash windows, kick in doors, disguise themselves as police, and rob keyholders at gun point. Strong cryptography is very powerful when it is done right, but it is not a panacea. Building a secure cryptographic system is easy to do badly and very difficult to do well. Unfortunately, most people can't tell the difference. In this article, the author conveys some of the lessons learned in designing, analyzing, and breaking cryptographic systems.
引用
收藏
页码:29 / +
页数:6
相关论文
共 50 条
  • [1] ON THE CRYPTOGRAPHIC SYSTEM VULNERABILITIES
    Unkasevic, Tomislav B.
    Peric, Miroslav V.
    Banjac, Zoran D.
    2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 110 - 113
  • [2] Vulnerabilities of One Cryptographic Protocol
    Kop'ev, D. V.
    MOSCOW UNIVERSITY MATHEMATICS BULLETIN, 2009, 64 (01) : 44 - 45
  • [3] Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries
    Blessing, Jenny
    Specter, Michael A.
    Weitzner, Daniel J.
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 605 - 620
  • [4] On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms
    Breier, Jakub
    Jap, Dirmanto
    Hou, Xiaolu
    Bhasin, Shivam
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1072 - 1085
  • [5] Cryptographic Vulnerabilities in Real-Life Web Servers
    Alashwali, Eman Salem
    2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 6 - 11
  • [6] sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps
    Gajrani, Jyoti
    Tripathi, Meenakshi
    Laxmi, Vijay
    Gaur, M. S.
    Conti, Mauro
    Rajarajan, Muttukrishnan
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 854 - 860
  • [7] Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
    Cilardo, Alessandro
    Mazzocca, Nicola
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 810 - 820
  • [8] Python']Python Cryptographic Secure Scripting Concerns: A Study of Three Vulnerabilities
    LaMalva, Grace
    Schmeelk, Suzanna
    Dinesh, Dristi
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 602 - 613
  • [9] On the Design of Cryptographic Primitives
    Pino Caballero-Gil
    Amparo Fúster-Sabater
    Acta Applicandae Mathematica, 2006, 93 : 279 - 297
  • [10] Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases
    Xiao, Ya
    Zhao, Yang
    Allen, Nicholas
    Keynes, Nathan
    Yao, Danfeng Daphne
    Cifuentes, Cristina
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):