Perspectives On Obscurity
This is the outline of a talk I gave at the rump session of
Financial Cryptography 1997 conference. It is in response to a paper
with a section 'In Defense of Obscurity.' While I believe obscurity can be useful, I also feel there are few people able to properly
evaluate its use and benefits.
- Lack of code slows (stops?) process of good guys commenting.
- NDA process is slow
- NDA process is often unacceptable to academics
- Process does work--sometimes
- Cost of hiring outsiders to do what academics will do free
- New players have trouble getting code
- Lack of code does not slow bad guys
- As much
- Theft of source
- Disassembly
- Bad guys have more time
- 16 year old high school student vs.
- 45 year old professional with 2 kids
- payoff may be high
- Overestimates of benefits I've seen programmers better
than me take sparc assembler back to C as fast as they can
write.
- Risk of bad publicity
- Security Dynamics
Plagued for years by rumors that
could not be dispelled while their protocol was secret.
It turns out the most rumored attacks about the value of
breaking the chips were inaccurate.
- Mondex
Unable to respond to claims that DFA would
smash their system effectively, since obscurity forced
them to speak in generalities.
- Protocols not a good place for obscurity
Few people break protocols. Many published ones go for
years without problems being found. Taking away most of the
(good) eyes means that only bad guys will be breaking your
protocol.
- Few people can objectively weigh the risks of obscurity.
- The author in question clearly can.
- That does not mean you can
- Pseudononymous publication
- Publish protocol through someone not public-ally affiliated with you
- Publish protocol without name of real protocol
- Lie in the right places
- Use the IDEA cipher
- Tell people you're using CAST
- Both are 128 bit key, do they have the same block size?
- Allows analysis by outsiders
No need to know which unbroken block cipher is in use
for most attacks. You might even get a paper that shows
an attack if you were using IDEA.
- Results in a more accurate estimate of time to break obscurity.
Adam Shostack
Last modified: Mon Mar 3 16:25:12 EST