Cryptographic design vulnerabilities

被引:88
|
作者
Schneier, B
机构
关键词
D O I
10.1109/2.708447
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Popular magazines often describe cryptography products in terms of algorithms and key lengths. These security techniques make good headlines ("Triple DES is much stronger than single DES."). Unfortunately, cryptography isn't so simple: Longer keys do not guarantee more security. Compare a cryptographic algorithm to the lock on your front door. Improving the lock probably won't make your house more secure. Burglars don't try every possible key (the equivalent of a brute-force attack); most aren't clever enough to pick the lock (the equivalent of a cryptographic attack). No, burglars smash windows, kick in doors, disguise themselves as police, and rob keyholders at gun point. Strong cryptography is very powerful when it is done right, but it is not a panacea. Building a secure cryptographic system is easy to do badly and very difficult to do well. Unfortunately, most people can't tell the difference. In this article, the author conveys some of the lessons learned in designing, analyzing, and breaking cryptographic systems.
引用
收藏
页码:29 / +
页数:6
相关论文
共 50 条
  • [31] Design and Implementation of the Components of the Symmetric Cryptographic Algorithm
    Ci, Yunfei
    Shi, Guozhen
    Yang, Feng
    Diao, Jiawen
    Liu, Cuijie
    Mao, Weihua
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 483 - 487
  • [32] The Design of High Performance Elliptic Curve Cryptographic
    Hong, Jin-Hua
    Wu, Wei-Chung
    2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 527 - 530
  • [33] The design and implementation of a transparent cryptographic filesystem for UNIX
    Cattaneo, G
    Catuogno, L
    Del Sorbo, A
    Persiano, P
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2001, : 199 - 212
  • [34] Algebraic Methods for the Design of Cryptographic Systems.
    Niederreiter, Harald
    1988, 105 (01): : 35 - 40
  • [35] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [36] Design of a variable key length cryptographic processor
    Bharathwaj, SV
    Kishore, LN
    Arulalan, MR
    Proceedings of the 4th WSEAS International Conference on Applications of Electrical Engineering, 2005, : 231 - 236
  • [37] SPONGENT: The Design Space of Lightweight Cryptographic Hashing
    Bogdanov, Andrey
    Knezevic, Miroslav
    Leander, Gregor
    Toz, Deniz
    Varici, Kerem
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (10) : 2041 - 2053
  • [38] Recent developments in the design of conventional cryptographic algorithms
    Preneel, B
    Rijmen, V
    Bosselaers, A
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 105 - 130
  • [39] Cryptographic Coprocessor Design for IoT Sensor Nodes
    Wang, Weizhen
    Han, Jun
    Xie, Zhicheng
    Huang, Shan
    Zeng, Xiaoyang
    2016 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2016, : 37 - 38
  • [40] Design Optimization and Automation for Secure Cryptographic Circuits
    Lin, Kuan Jen
    Chiu, Yi Tang
    Fang, Shan Chien
    22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 321 - +