Security Basics mailing list archives

RE: ICMP (Ping)


From: Tim Greer <chatmaster () charter net>
Date: 05 Sep 2003 10:53:09 -0700

On Thu, 2003-09-04 at 17:20, Gerard Marshall Vignes wrote:
The applicable tenet from encryption is that the encryption method is known,
while the key is kept secret. This is taken to an extreme today, where many
common encryption methods are published openly. This is why attackers
usually try to get the keys. These encryption methods are both efficient and
effective.

If you read about the Allies cracking of Ultra (Shark, Enigma) during WWII,
you can see the relevance of this tenet.  The German use of rotors and plugs
seemed to make it an invincible encryption engine.  But the Bletchley staff
understood the basic mechanism and devised a way to 
Separate the effects of the rotors from the effects of the plugs.  As it
turned out, the plugs contributed very little to the security of Ultra.  The
Germans would have done better by using more rotors (5-10) and left the
plugs out completely. The result would have been a somewhat larger but
simpler machine that was easier to use but far more difficult to crack.

Please feel free to flame me for butting in w/o being invited  :-)


If it helps at all, I'm utterly confused by your response and the
relevancy.  :-)
-- 
Tim Greer <chatmaster () charter net>


---------------------------------------------------------------------------
Attend Black Hat Briefings & Training Federal, September 29-30 (Training), 
October 1-2 (Briefings) in Tysons Corner, VA; the world's premier 
technical IT security event.  Modeled after the famous Black Hat event in 
Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.  
Symantec is the Diamond sponsor.  Early-bird registration ends September 6.Visit us: www.blackhat.com
----------------------------------------------------------------------------


Current thread: