Abstract
While cryptography has advanced greatly since since 2001, Internet security protocols have not. Here is a list of the algorithms that are used in common SSL/TLS stacks:
-
RSA in PKCS#1 1.5 mode (1993)
-
MD5 (1982)
-
SHA-1 (1993)
-
DES (1976) and AES (2001) in CBC mode (with chained IVs)
-
RC4 (1987, leaked 1994)
The situation is similar for other protocols such as IPsec and S/MIME. Without exception, all of these algorithms have known deficiencies, and in many cases these deficiencies have led to practical or semi-practical attacks. Despite this, implementors and users have responded either by ignoring these issues or by adding layers of countermeasures to the attacks which are presently known. Even when new protocols are designed – for instance the IETF’s new JSON-based secure messaging effort – designers often select older algorithms over newer, more secure ones. In this talk, we explore how we got into this situation, if we can get out, and if we even want to.
Chapter PDF
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rescorla, E. (2011). Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography?. In: Bernstein, D.J., Chatterjee, S. (eds) Progress in Cryptology – INDOCRYPT 2011. INDOCRYPT 2011. Lecture Notes in Computer Science, vol 7107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25578-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-25578-6_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25577-9
Online ISBN: 978-3-642-25578-6
eBook Packages: Computer ScienceComputer Science (R0)