Jump to content

Snake oil (cryptography): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
Line 10: Line 10:
; Secret system : Some encryption systems will claim to rely on a secret algorithm, technique, or device; this is categorized as [[security through obscurity]]. Criticisms of this are twofold: first, a long-standing principle, [[Shannon's Maxim]], states that "the enemy knows the system" and that secrecy does not afford the user any advantages. Secondly, secret methods are not open to public [[peer review]] and [[cryptanalysis]] and so potential mistakes and insecurities can go unnoticed for great lengths of time.
; Secret system : Some encryption systems will claim to rely on a secret algorithm, technique, or device; this is categorized as [[security through obscurity]]. Criticisms of this are twofold: first, a long-standing principle, [[Shannon's Maxim]], states that "the enemy knows the system" and that secrecy does not afford the user any advantages. Secondly, secret methods are not open to public [[peer review]] and [[cryptanalysis]] and so potential mistakes and insecurities can go unnoticed for great lengths of time.


; [[Technobabble]] : Since cryptography is a complicated subject, snake oil salespeople may use "technobabble" to sell their product.
; [[Technobabble]] : Since cryptography is a complicated subject, snake oil salespeople may use "technobabble" to sell their product.


; "Unbreakable" : Claims of a system or cryptographic method being "unbreakable" are almost always false, and are generally considered a sure sign of snake oil.
; "Unbreakable" : Claims of a system or cryptographic method being "unbreakable" are almost always false, and are generally considered a sure sign of snake oil.


; [[One-time pad]]s : One-time pads are a popular cryptographic method to invoke in advertising, because it is well known that one-time pads, when implemented correctly, are genuinely unbreakable. The problem comes in implementing one-time pads, which is rarely done correctly. In several cases, it may be impossible to implement. Cryptographic systems that claim to be based on one-time pads are considered suspect, particularly if they do not describe how the one-time pad is implemented, or they describe a flawed implementation.
; [[One-time pad]]s : One-time pads are a popular cryptographic method to invoke in advertising, because it is well known that one-time pads, when implemented correctly, are genuinely unbreakable. The problem comes in implementing one-time pads, which is rarely done correctly. Cryptographic systems that claim to be based on one-time pads are considered suspect, particularly if they do not describe how the one-time pad is implemented, or they describe a flawed implementation.

; Unsubstantiated "bit" claims : Cryptographic products are often accompanied with claims of using a high number of bits for encryption, apparently referring to the [[key length]] used. However key lengths are not directly comparable between symmetric and asymmetric systems. Furthermore, the details of implementation can render the system vulnerable. For example, in 2008 it was revealed that a number of [[hard drive]]s sold with built in "128-bit [[AES]] encryption" were actually using a simple and easily defeated "[[XOR]]" scheme. AES was only used to store the key, which was easy to recover without breaking AES. [http://www.heise-online.co.uk/security/features/print/110136]


==External links==
==External links==

Revision as of 14:22, 19 February 2008

In cryptography, snake oil is a term used to describe commercial cryptographic methods and products which are considered bogus or fraudulent. The name derives from snake oil, one type of quack medicine widely available in 19th Century United States.

Distinguishing secure cryptography from insecure cryptography can be difficult from the viewpoint of a user. Many cryptographers, such as Bruce Schneier and Phil Zimmermann, undertake to educate the public in how secure cryptography is done, as well as highlighting the misleading marketing of some cryptographic products.

The Snake Oil FAQ describes itself as, "a compilation of common habits of snake oil vendors. It cannot be the sole method of rating a security product, since there can be exceptions to most of these rules. [...] But if you're looking at something that exhibits several warning signs, you're probably dealing with snake oil."

Some examples of snake oil cryptography techniques

This is not an exhaustive list of snake oil signs. A more thorough list is given in the external articles linked in the section below.

Secret system
Some encryption systems will claim to rely on a secret algorithm, technique, or device; this is categorized as security through obscurity. Criticisms of this are twofold: first, a long-standing principle, Shannon's Maxim, states that "the enemy knows the system" and that secrecy does not afford the user any advantages. Secondly, secret methods are not open to public peer review and cryptanalysis and so potential mistakes and insecurities can go unnoticed for great lengths of time.
Technobabble
Since cryptography is a complicated subject, snake oil salespeople may use "technobabble" to sell their product.
"Unbreakable"
Claims of a system or cryptographic method being "unbreakable" are almost always false, and are generally considered a sure sign of snake oil.
One-time pads
One-time pads are a popular cryptographic method to invoke in advertising, because it is well known that one-time pads, when implemented correctly, are genuinely unbreakable. The problem comes in implementing one-time pads, which is rarely done correctly. Cryptographic systems that claim to be based on one-time pads are considered suspect, particularly if they do not describe how the one-time pad is implemented, or they describe a flawed implementation.
Unsubstantiated "bit" claims
Cryptographic products are often accompanied with claims of using a high number of bits for encryption, apparently referring to the key length used. However key lengths are not directly comparable between symmetric and asymmetric systems. Furthermore, the details of implementation can render the system vulnerable. For example, in 2008 it was revealed that a number of hard drives sold with built in "128-bit AES encryption" were actually using a simple and easily defeated "XOR" scheme. AES was only used to store the key, which was easy to recover without breaking AES. [1]