Re: Stream Cipher Transform -- revisited
John Gilmore <gnu@toad.com> Wed, 31 July 1996 09:09 UTC
Received: from relay.hq.tis.com by neptune.TIS.COM id aa07109; 31 Jul 96 5:09 EDT
Received: by relay.hq.tis.com; id FAA07394; Wed, 31 Jul 1996 05:12:39 -0400
Received: from sol.hq.tis.com(192.33.112.100) by relay.tis.com via smap (V3.1.1) id xma007392; Wed, 31 Jul 96 05:12:10 -0400
Received: from relay.hq.tis.com by tis.com (4.1/SUN-5.64) id AA15453; Wed, 31 Jul 96 05:11:43 EDT
Received: by relay.hq.tis.com; id FAA07389; Wed, 31 Jul 1996 05:12:09 -0400
Received: from toad.com(140.174.2.1) by relay.tis.com via smap (V3.1.1) id xma007387; Wed, 31 Jul 96 05:11:42 -0400
Received: from localhost (localhost [127.0.0.1]) by toad.com (8.7.5/8.7.3) with SMTP id CAA23906; Wed, 31 Jul 1996 02:13:41 -0700 (PDT)
Message-Id: <199607310913.CAA23906@toad.com>
X-Authentication-Warning: toad.com: Host localhost [127.0.0.1] didn't use HELO protocol
To: "Terry L. Davis, Boeing Information & Support Services, Bellevue, WA" <tld5032@commanche.ca.boeing.com>
Cc: Germano Caronni <caronni@tik.ee.ethz.ch>, ipsec@TIS.COM, skip-info@tik.ee.ethz.ch, markson@incog.com, dpalma@netcom.com, Project SKIP <skip@tik.ee.ethz.ch>, Burkhard Stiller <stiller@tik.ee.ethz.ch>, Bernhard Plattner <plattner@tik.ee.ethz.ch>, gnu@toad.com
Subject: Re: Stream Cipher Transform -- revisited
In-Reply-To: <9607301455.AA21468@commanche.ca.boeing.com>
Date: Wed, 31 Jul 1996 02:13:40 -0700
From: John Gilmore <gnu@toad.com>
Sender: ipsec-approval@neptune.tis.com
Precedence: bulk
I advise against making *any* design decision that trades off security or privacy for MIPS (beyond hitting the sweet spot in the market: running broadly useful data rates on cheap up-to-the-minute hardware). It's absolutely clear that the short-term, medium-term and long-term trends all tell us we will have plenty more MIPS whenever we want them. But we won't have plenty of security or privacy; both are up for grabs and there's no predictable outcome. Why give up something scarce to get something plentiful? Particularly when designing an architecture that will last for a decade or more. It's hard for people to think about the consequences of exponential factors like chip feature sizes. People told Richard Stallman he was crazy to build a compiler that needed more than a megabyte to run, or a text editor that kept the whole file in memory. He was right, they were wrong. "Eight Megabytes And Constantly Swapping" EMACS is pretty tame stuff on a 48-meg Pentium laptop, which has to do full-screen video to work up a sweat. Legacy systems that support a hundred users without encryption can't always have their speed doubled as easily as last year's clone. But an external encrypting gateway, built cheaply with this year's technology, can burn all the new MIPS, and hand the same old stuff to the legacy system. Exportability of solutions from the US is *NOT* very important this year. Last year, last decade, sure. We played that game and it was a losing game. We can keep losing or we can play a different game. RSA has noticed this; that's why they're making global alliances to build strong crypto worldwide. The IAB and IESG have noticed this. I hope the IPSEC working group knows it solidly, too. Note that by playing the new game well, the old game resolves itself (the gov't gives up), which could never happen while we continued to play by their rules. John Gilmore (An equal opportunistic encryptor.)
- Stream Cipher Transform -- revisited Germano Caronni
- Re: Stream Cipher Transform -- revisited Terry L. Davis, Boeing Information & Support Services, Bellevue, WA
- Re: Stream Cipher Transform -- revisited Tatu Ylonen
- Re: Stream Cipher Transform -- revisited John Gilmore
- Re: Stream Cipher Transform -- revisited C. Harald Koch