[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Provably Correct Crypto?
> I stipulated I didn't want any such garbage, I specifically said
> english summaries are not acceptable and you bombard me with them.
> Yet you wont accept others opinion of PGP's security, which verbal or
> other wise, can only be an abstract summary.
The difference between my response to your question and your responses
to my questions is that I tried to answer your questions.
> > > You state that crypto should be poved correct and suggest a technique
> > > otherwise known as formal specification. I agree, pgp should have
> > > been written in Z-specs. If you take a course in formal specification
> > > you will soon see the intractability of the technique wrt large
> > > systems.
> >
> > I didn't say that. Perhaps you should review what I said before
> > characterizing it.
>
> piffle! Your words:
> "I think that this issue can generally be addressed by a divide
> and conquer strategy. Prove that the called routines are
> correct and confined under all possible parameters, do the
> same for the calling routines, do the same for the interaction
> between them, and I think you have it."
I don't see wher I said anything about formal specification here or Z-specs.
It's true that proof of correctness for large systems is a hard problem, and
that is one of the reasons that the secure http daemon is designed to be small.
However, the same has not been shown (as far as I am aware) for many of the
other properties that may be interesting from a security standpoint.
> This sounds like performing a formal analsis to me. And you didn't
> address the intractability anyway.
Problems worthy of attack, prove their worth by fighting back - Alan Perlis
> > I have shown (not yet proven) certain things. A graduate student is now
> > working on trying to prove the various properties I believe to be of
> > interest in an automatic theorum prover he is working on.
>
> The work in automatic theorum proving is ongoing and not limited to
> your grad student or your work.
I never said it was and he is not my grad student. He is a grad student
who made some comments on the daemons and decided he would be interested
in seeing if some of these properties could be proven.
> > I believe that these things are worth showing (and proving), but you
> > may certainly feel free to disagree with these contentions.
>
> I said showing by english isn't good enough, proving would be
> fantastic. I don't believe these issues reside solely with pgp and as
> such you should question computability as a whole before using
> "incomplete specification" in accusing one system to be flawed.
And I told you that we are in the process of, but not finished with, doing
just that. I never said that any such problems reside solely in PGP.
> > > If you want prople on this list to repeat after you "I cannot be
> > > certain there is no compromising bugs or backdoors in X" Then I will
> > > go out on a limb and say everyone here will agree if system X is
> > > sufficiently large.
> >
> > I don't believe I ever asked anyone on this list to repeat anything.
> > All I did was ask questions and respond to responses to my questions.
>
> Your tiresome repetitive question was "Why do you belive X is secure"
> I herby answer exactly as above "I cannot be certain there is no
> compromising bugs or backdoors in X"
If you are tired of hearing my responses to your comments, there is an
obvious solution.
--
-> See: Info-Sec Heaven at URL http://all.net
Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236