Cryptographic design vulnerabilities

被引:88
|
作者
Schneier, B
机构
关键词
D O I
10.1109/2.708447
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Popular magazines often describe cryptography products in terms of algorithms and key lengths. These security techniques make good headlines ("Triple DES is much stronger than single DES."). Unfortunately, cryptography isn't so simple: Longer keys do not guarantee more security. Compare a cryptographic algorithm to the lock on your front door. Improving the lock probably won't make your house more secure. Burglars don't try every possible key (the equivalent of a brute-force attack); most aren't clever enough to pick the lock (the equivalent of a cryptographic attack). No, burglars smash windows, kick in doors, disguise themselves as police, and rob keyholders at gun point. Strong cryptography is very powerful when it is done right, but it is not a panacea. Building a secure cryptographic system is easy to do badly and very difficult to do well. Unfortunately, most people can't tell the difference. In this article, the author conveys some of the lessons learned in designing, analyzing, and breaking cryptographic systems.
引用
收藏
页码:29 / +
页数:6
相关论文
共 50 条
  • [21] Design and analysis of cryptographic protocols for RFID
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Xuebao, 2006, 4 (581-589):
  • [22] An Efficient Reversible Cryptographic Circuit Design
    Mondal, Bikromadittya
    Dey, Kushal
    Chakraborty, Susanta
    2016 20TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2016,
  • [23] SinCRY: Preventive Defense Tool for Detecting Vulnerabilities in Java']Java Applications Integrating Cryptographic Modules
    Fattahi, Jaouhar
    Couture, Mario
    Mejri, Mohamed
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18), 2018, 303 : 187 - 200
  • [24] CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java']Java Projects
    Rahaman, Sazzadur
    Xiao, Ya
    Afrose, Sharmin
    Shaon, Fahad
    Tian, Ke
    Frantz, Miles
    Kantarcioglu, Murat
    Yao, Danfeng
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2455 - 2472
  • [25] Removing Software Vulnerabilities During Design
    Yee, George O. M.
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 504 - 509
  • [26] A design of hardware cryptographic co-processor
    Fan, MY
    Wang, JH
    Wang, GW
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 234 - 236
  • [27] Using the ANOVA F-Statistic to Rapidly Identify Near-Field Vulnerabilities of Cryptographic Modules
    Iyer, Vishnuvardhan V.
    Yilmaz, Ali E.
    2021 IEEE MTT-S INTERNATIONAL MICROWAVE SYMPOSIUM (IMS), 2021, : 112 - 115
  • [28] A Comparative Study on Design and Usability of Cryptographic Libraries
    Luo, Junwei
    Yang, Xuechao
    Yi, Xun
    Han, Fengling
    Gondal, Iqbal
    Huang, Guang-Bin
    PROCEEDINGS OF 2023 AUSTRALIAN COMPUTER SCIENCE WEEK, ACSW 2023, 2023, : 102 - 111
  • [29] Protocol engineering principles for cryptographic protocols design
    Dong, Ling
    Chen, Kefei
    Wen, Mi
    Zheng, Yanfei
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 641 - +
  • [30] Design of cellular automata hardware for cryptographic applications
    Franti, E
    Slav, C
    Balan, T
    Dascalu, M
    2004 International Semiconductor Conference, Vols 1and 2, Proceedings, 2004, : 463 - 466