[e2e] security through obscurity *does* work - keep an open mind...

David P. Reed dpreed at reed.com
Mon Feb 13 11:36:10 PST 2006


Scott Boone wrote:

>[ insert anecdotate about "why security through
>  obscurity doesn't work" here ]
>
Actually, cryptography is merely "security through obscurity".   The 
only issue is the work factor involved.

It's perfectly reasonable, IMHO, to use precise timing correlation 
filters vs. keyed sequence filters (e.g., PR sequences generated 
algorithmically from a key that has relatively low entropy generated 
from a 6-8 character mnemonic password) as the mechanism to raise the 
work factor.

There's no a priori reason that precisely controllable timing can't 
generate high robustness against attacks.   Remember that DDoS attacks, 
for example, gain some of their power by synchronization, so limiting 
the ability to synchronize collective action would raise the work factor 
threshold for DDoS.

Reasoning by slogan is dangerous - that's more or less how we end up 
with MD5 being viewed as "secure" as it was...

Or those who are ignorant of evanescent waves saying such boners as "you 
can't tap optical fibers without detection because you have to break 
them; you can't inject signals into optical fibers without detection 
because that can only be done at the endpoints".   Such scientific 
ignorance provides no protection at all...


More information about the end2end-interest mailing list