At 09:24 AM 9/21/02 -0400, Derek Atkins wrote: ... >This isn't security -- this is a small-form-factor physical ROM. This >"read-only data crystal". The fact that they cannot be duplicated >easily just means that you cannot use these tokens for real data >storage. Imagine if they _were_ replicable.. Imagine keeping a >terabyte of backup data on one of these tokens!
Well, you can get a nice (provable) level of security from a big memory device like this, if the entries are random, and if there is a strict limit on how quickly you can read information out of it. Bruce Schneier and I did a paper on this several years ago. (Though I'm sure a bunch of other people had used the same idea in their own systems before....) Let's see...."Authenticating Secure Tokens Using Slow Memory Access," at the USENIX workshop on smartcard technology in 1999. The big question is under what conditions it's possible to read out a significant fraction of the data. If you have a secure token that refuses to respond to a memory query in less than a second, then the answer is pretty simple. For this device, it's not so clear. It might be that the device can't be read out by a compromised terminal (assuming there are one day terminals for these devices), but it may still be readable by someone who steals the device and takes it apart in a lab or something. >-derek --John Kelsey, [EMAIL PROTECTED] // [EMAIL PROTECTED] --John Kelsey, [EMAIL PROTECTED] // [EMAIL PROTECTED] --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
