• No results found

Providing security with insecure systems

N/A
N/A
Protected

Academic year: 2021

Share "Providing security with insecure systems"

Copied!
29
0
0

Loading.... (view fulltext now)

Full text

(1)

Providing security

with insecure systems

Andrew Odlyzko

School of Mathematics and

Digital Technology Center

(2)

• Basic question: What is the role of cryptography

and security in society?

– Why haven’t cryptography and security lived up to their promise?

– Is the future going to be any better?

• Main points:

– Strong economic, social, and psychological reasons for insecurity

– Chewing gum and baling wire will continue to rule – Not absolute security but “speed bumps”

– New design philosophy and new research directions

(3)

Security pyramid:

protocols

systems

(4)

Half a century of evidence:

•People cannot build secure

systems

•People cannot live with secure

systems

(5)

Honor System Virus

:

This virus works on the honor system.

Please forward this message to

everyone you know and then delete all

the files on your hard disk.

(6)

Major problem with

secure systems

:

secretaries could not forge

their bosses’ signatures

(7)

Proposed solution

:

•Build messy, not clean

•(Lessons from past and now)

•(Related to “defense in depth,”

“resilience.” …)

(8)

The dog that did not bark:

• Cyberspace is horribly insecure

(9)

The Big Question

:

•Why have we done so well in

spite of insecurity?

•Will this continue?

(10)

Key point:

security is not the goal, just

(11)

Civilian Cryptography of last 30 years:

• huge intellectual achievements, based on (and

providing stimulus for) mathematics:

– integer factorization – lattice basis reduction – probability

– elliptic and hyperelliptic curves – algebra

– …

(12)

Human vulnerabilities

:

• Nigerian 419 scam

• “social engineering

(13)

More general puzzle: Prosperity

and appalling innumeracy

•confusing millions with billions

•most spreadsheets flawed

•peer-reviewed papers with

(14)

Do not expect improvement: teaching

people about security won’t help:

• growth in ranks of users of high tech

• proliferation of systems and devices

Improvements in usability of individual

systems and devices to be counteracted

by growth in general complexity

(15)

1980s: the “Golden

Age” of civilian

cryptography and

security

(16)

1980s: the “Golden Age” of

civilian cryptography and security

But also:

the “Golden Age” of fax,

including fax signatures

(17)

1980s: the “Golden Age” of

civilian cryptography and security

But also:

the “Golden Age” of fax, including

fax signatures

(18)

Why does a fax signature work?

• Hard to do serious damage with a single forged fax

• Fax usually just one of many elements of an

interaction (involving heterogeneous elements, such

as phone calls, emails, personal meetings, ...)

The role of a fax signature has to be viewed in the

context of the entire transaction. (And it is not used

for definitive versions of large contracts, ...)

(19)

Search for definition of a digital

signature hampered by lack of

definition of ordinary signature

:

validity of ordinary signature depends on a

variety of factors (such as age of signer,

whether she was sober, whether she had a gun

pointed at her head, whether the contract is

(20)

Human space vs. cyberspace

in technologists’ view:

•separate

•cyberspace a new world

•cyberspace to compensate for

defects of human space

(21)

Cold dose of reality:

•human space and cyberspace

intertwined

•human space compensates

for defects of cyberspace

(22)

The role of cyberspace is increasing, and

attacks and other action in cyberspace are

faster and more far-reaching than in physical

• Partial Solutions: Speed bumps

• Example: e-voting

– Untrustworthy electronic systems compensated

by printed record of vote

(23)
(24)

Advantages of messy: April 20,

2010 story about Apple

• Apple claim: “jailbreaking iPhone OS major

source of instabilities, disruption of service”

• Does Apple want clean, modular OS?

(25)

If you can barely keep

your system running:

how useful will it be to your

(26)

Contrarian lessons for the

future:

•learn from spammers, phishers,

•build messy and not clean

– create web of ties to other systems

– permanent records

(27)

Speed of light vs. effective

speed of change

• "Internet time" a key misleading myth of the

bubble

• diffusion of information (even security holes)

not instantaneous

(28)

Contrarian lessons for the future

(cont’d, in detail):

• security through obscurity

• code obfuscation, “spaghetti code,”

• “least expressive languages”

• rely on bad guys’ human failings

• law and lawyers

(29)

Further data, discussions, and

speculations in papers and

presentation decks at

:

http://www.dtc.umn.edu/~odlyzko

References

Related documents

Trends in single-drug substitution, treatment interruption and second-line switching over 24-months on ART stratified by year of ART initiation HIV-infected patients <20 years

G63.9 Unspecified other open operations on jejunum G69.1 Ileectomy and anastomosis of stomach to ileum G69.2 Ileectomy and anastomosis of duodenum to ileum G69.3 Ileectomy

In the week before winter term starts, the International Office organizes an ‘Orientation week’ to welcome international students to Ansbach University of Applied Sciences and

Times Used Last Used Executable Path Executable Version Executable Description Software ID {07FA4960-B038-49EB-891B-9F95930AA544} HP LaserJet 400 MFP M425 Item Value Name

[r]

One of the main aims for the DDCR is to gain a better understanding of the status of the Lappet-faced vulture population visiting the reserve and identify their home-range,

KEY WORDS: embedded stereo vision, obstacle detection, obstacle avoidance, disparity estimation, semi-global matching, real-time stereo

We hypothesized that “overall mean error duration” (2HAND) and “performance level” (AHA) would also, or even better, predict performance in the neurofeedback approach to