[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Proxy Cryptography draft available
I had thought about this (proxy crypto) a few weeks ago as an attack. I
didn't give it much thought, as I'm weak on the math side, and it seemed to
me that it couldn't have been an original idea.
What really worries me is that this proxy function links alot of stuff
together: it links algorithms, it links keys, etc. If I develop a
supposedly strong system that has a proxy function for another strong
system, then essentially if mine gets broken the other does as well. Or,
if I recover the key for one system, I can recover the original key from
another system. The whole situation epitomises the old "A chain is only as
strong as its weakest link" adage. From a security point of view, this
really doesn't encourage me to include the capability for proxy functions
in any system I should happen to make. Am I missing something here?
_________ o s b o r n e @ g a t e w a y . g r u m m a n . c o m _________
"Everybody just butt out! I'm not in love with her! I'm Die Fledermaus!
The only person that I'm in love with is me and I'm out of here!" -Die
Fledermaus trying to explain his actions.