[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Fwd: EECS Colloquium Monday Oct 5]
--- begin forwarded text
Date: Wed, 30 Sep 1998 13:28:45 -0400
From: Richard Lethin <[email protected]>
Organization: Reservoir Labs, Inc.
MIME-Version: 1.0
To: [email protected]
Subject: [Fwd: EECS Colloquium Monday Oct 5]
Sender: [email protected]
Precedence: bulk
Reply-To: Richard Lethin <[email protected]>
Status: U
Return-Path: <[email protected]>
Received: from LCS.MIT.EDU (mintaka.lcs.mit.edu [18.26.0.36])
by deer-park.reservoir.com (8.8.5/8.8.5) with SMTP id LAA16438
for <[email protected]>; Wed, 30 Sep 1998 11:34:14 -0400 (EDT)
Received: from theory.lcs.mit.edu by MINTAKA.LCS.MIT.EDU id aa29635;
30 Sep 98 11:30 EDT
Received: from osprey.lcs.mit.edu by theory.lcs.mit.edu (5.65c/TOC-1.2S)
id AA03777; Wed, 30 Sep 98 11:29:45 EDT
From: [email protected] (Peter Elias)
Received: by osprey.lcs.mit.edu (5.65c/TOC-1.2C)
id AA00821; Wed, 30 Sep 98 11:29:47 EDT
Date: Wed, 30 Sep 98 11:29:47 EDT
Message-Id: <[email protected]>
To: [email protected], [email protected], [email protected],
[email protected], [email protected], [email protected],
[email protected], [email protected], [email protected],
[email protected], [email protected], [email protected],
[email protected], [email protected]
Subject: EECS Colloquium Monday Oct 5
Appended is the notice of an EECS Colloquium by Radia Perleman, on
Monday Oct. 5. Please post and/or forward as appropriate.
Peter Elias
----------------------------------------------------------------------
MIT-EECS
1998 Fall Semester
Colloquium Series
How to Misuse Good Cryptography
And Create Insecure Network Protocols
Radia Perlman
Boston Center for Networking
SUN Microsystems
ABSTRACT
A common misconception is that security flaws involve abstruse
mathematical weaknesses in cryptographic algorithms. While it is
possible to have weak cryptographic algorithms, the world does not
need insecure cryptographic systems in order to design, build, and
deploy insecure network protocols.
This talk discusses example mistakes people have made when designing
or implementing network protocols. Examples include an e-mail standard
that allowed forging of signatures, a public key scheme less secure
than a secret key scheme, a system that thought encryption implied
integrity protection, and public key chain rules that are unworkable
in practice.
October 5, 1998
4-5 pm
Edgerton Hall, 34-101 (50 Vassar St)
Refreshments at 3:45
----------------------------------------------------------------------
--- end forwarded text
-----------------
Robert A. Hettinga <mailto: [email protected]>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'