Cryptographic design vulnerabilities

被引:88
|
作者
Schneier, B
机构
关键词
D O I
10.1109/2.708447
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Popular magazines often describe cryptography products in terms of algorithms and key lengths. These security techniques make good headlines ("Triple DES is much stronger than single DES."). Unfortunately, cryptography isn't so simple: Longer keys do not guarantee more security. Compare a cryptographic algorithm to the lock on your front door. Improving the lock probably won't make your house more secure. Burglars don't try every possible key (the equivalent of a brute-force attack); most aren't clever enough to pick the lock (the equivalent of a cryptographic attack). No, burglars smash windows, kick in doors, disguise themselves as police, and rob keyholders at gun point. Strong cryptography is very powerful when it is done right, but it is not a panacea. Building a secure cryptographic system is easy to do badly and very difficult to do well. Unfortunately, most people can't tell the difference. In this article, the author conveys some of the lessons learned in designing, analyzing, and breaking cryptographic systems.
引用
收藏
页码:29 / +
页数:6
相关论文
共 50 条
  • [41] Design of Arithmetic Building Blocks for Cryptographic Systems
    Abd-El-Barr, Mostafa
    Al-Noori, Aisha
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 124 - 129
  • [42] Design and Implementation of DNA Based Cryptographic Algorithm
    Pradeeksha, Shirley A.
    Sathyapriya, Sridevi S.
    2020 5TH INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS' 20), 2020, : 299 - 302
  • [43] Alternative design for quantum cryptographic entangling probe
    Brandt, HE
    JOURNAL OF MODERN OPTICS, 2006, 53 (08) : 1041 - 1045
  • [44] Cryptographic protocol design concept with genetic algorithms
    Park, K
    Hong, CL
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 483 - 489
  • [45] Diffusive primitives in the design of modern cryptographic algorithms
    Jamel, Sapiee Haji
    Deris, Mustafa Mat
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 707 - 710
  • [46] Design of Cryptographic Hardware Architecture for Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Cho, Hyunsook
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (04): : 187 - 196
  • [47] A HARDWARE DESIGN-MODEL FOR CRYPTOGRAPHIC ALGORITHMS
    DAEMEN, J
    GOVAERTS, R
    VANDEWALLE, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 419 - 434
  • [48] Some applications of polynomials for the design of cryptographic protocols
    Kushilevitz, E
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
  • [49] Design of RSA processor for concurrent cryptographic transformations
    Vollala, Satyanarayana
    Varadhan, V. V.
    Geetha, K.
    Ramasubramanian, N.
    MICROELECTRONICS JOURNAL, 2017, 63 : 112 - 122
  • [50] Design and implementation of security vulnerabilities scanner system
    Dai, Zufeng
    Zhang, Yuqing
    Hu, Yupu
    Hong, Hong
    Xie, Chongbin
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (09):