Phil Howard <[EMAIL PROTECTED]> writes:
> Ultimately, I'll personally depend on crypto in software I can access for
> myself.  I think that's your real point.

Thanks for the well thought-out reply.

I too would place a heck of a lot less trust in some crypto chip than
something that is inspectable.

> What interests me among Hifn's chips are not the crypto capabilities, but
> the compression capabilities.

Interesting.  I didn't realize they did that.  It looks like a safe
enough use.

knitti <[EMAIL PROTECTED]> writes:
> any algorithm the cards claim to implement _is_ fully documented, so
> you can test any output except that of the RNG against a 'known
> good' implementation

Even if the cipherstream out of a chip is the same as the software
implementation in general, what prevents the chip from switching to a
trojan mode when it sees a certain data-pattern in the plaintext input
stream?  Sure the other side might not be able to decrypt the doctored
up cipherstream, but the information would have already been leaked.
Heck, if both sides use the same chip, the receiving chip could even
recognize the data stream and pretend that nothing out of the ordinary
were going on.

Personally I don't see how a hardware chip maker can prove that the
chip doesn't have a trojan without providing masks for inspection and
a way to prove that those masks and only those masks were used to make
the chip.  Open source and all that.

-wolfgang
-- 
Wolfgang S. Rupprecht                http://www.wsrcc.com/wolfgang/

Reply via email to