Encryption and risk
    Richard Pieri 
    richard.pieri-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
       
    Tue Oct  6 10:56:26 EDT 2009
    
    
  
On Oct 6, 2009, at 10:27 AM, Dan Ritter wrote:
> Everyone seems to be ignoring the real brute force attack:
> rubber-hose cryptanalysis.
I did not ignore it; I simply chose not to address it.  But since you  
asked... :)
Obviously, no algorithm can be proof against a rubber hose attack.   
Securing against rubber hoses is a matter of implementation.  One  
possible mechanism is something similar to standard code signing  
practice with multi-factor authentication.  The user has a pass phrase  
(virtual key).  The site has a hard token of some sort.  That token is  
stored in a secured area (physical key).  The user does not have  
access to said secured area and must make a request through physical  
security to sign out the token and sign it back in after the code  
signing is complete.  And, of course, physical security monitors the  
checked-out token at all times.
--Rich P.
    
    
More information about the Discuss
mailing list