<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=OpenWest_2014%2FCargo_Cult_Security</id>
	<title>OpenWest 2014/Cargo Cult Security - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=OpenWest_2014%2FCargo_Cult_Security"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=OpenWest_2014/Cargo_Cult_Security&amp;action=history"/>
	<updated>2026-04-30T05:52:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=OpenWest_2014/Cargo_Cult_Security&amp;diff=46&amp;oldid=prev</id>
		<title>Kenneth at 15:24, 11 May 2014</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=OpenWest_2014/Cargo_Cult_Security&amp;diff=46&amp;oldid=prev"/>
		<updated>2014-05-11T15:24:07Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;by Derrick Isaacson &lt;br /&gt;
&lt;br /&gt;
Cargo Cult Security 2014_01_18 - http://www.slideshare.net/DerrickIsaacson/cargo-cult-security-20140118&lt;br /&gt;
&lt;br /&gt;
Github - https://github.com/disaacson/cargo-cult-security&lt;br /&gt;
&lt;br /&gt;
Zimmermann Telegram - Mexico German war&lt;br /&gt;
&lt;br /&gt;
Cypher text, plain text&lt;br /&gt;
&lt;br /&gt;
Symmetric Key Cryptography (Private-key Cryptography)&lt;br /&gt;
&lt;br /&gt;
Blowfish, twofish, serpent, aes (rijndael) cast5, rc4, 3des, idea&lt;br /&gt;
&lt;br /&gt;
Ctrypto Primitives &amp;amp; Goals - https://oracleus.activeevents.com/2013/connect/sessionDetail.ww?SESSION_ID=6325&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Crytpo Primitives	Hash		MAC		Symmetric Key	Asymmetric Key	Digital		Digital&lt;br /&gt;
			Salted Hash	HMAC		Crypto		Crypto		Signature	Certificates&lt;br /&gt;
&lt;br /&gt;
Security Goals&lt;br /&gt;
--------------------------------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Data Integrity		XXX		XXX						XXX&lt;br /&gt;
&lt;br /&gt;
Data Authentication			XXX				XXX		XXX&lt;br /&gt;
&lt;br /&gt;
Non-Repudiation								XXX		XXX&lt;br /&gt;
&lt;br /&gt;
Confidentiality						XXX		XXX*&lt;br /&gt;
&lt;br /&gt;
Trust													XXX&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* Public key can be used to encrypt data that can only be decrypted with private key&lt;br /&gt;
&lt;br /&gt;
Love HMACs&lt;br /&gt;
&lt;br /&gt;
Cargo Cult Programming - Ritualistic inclusion of code or patterns that are unnecessary for the task at hand.&lt;br /&gt;
&lt;br /&gt;
Anti-pattern: authentication&lt;br /&gt;
* using encryption for authentication is bad.  Use HMAC instead&lt;br /&gt;
* don&amp;#039;t use symmetric key alone, as flipping a bit will just bump IDs to the next&lt;br /&gt;
* Use HMAC&lt;br /&gt;
&lt;br /&gt;
Anti-pattern: Integrity&lt;br /&gt;
* Symmetric key is only good for confidentiality&lt;br /&gt;
* HMAC good for Data Integrity and Data Authentication&lt;br /&gt;
&lt;br /&gt;
Anti-pattern: Encryption Modes&lt;br /&gt;
* Electronic Codebook (ECB) mode encryption&lt;br /&gt;
** can do bit mapping (think picture) hack to get an idea of contained data&lt;br /&gt;
* Cipher Block Chaining (CBC) mode encryption&lt;br /&gt;
** avoids the patterns found among blocks of ECB&lt;br /&gt;
&lt;br /&gt;
Anti-pattern: Initialization Vector&lt;br /&gt;
* Avoid same data being encrypted repeatedly looking the same&lt;br /&gt;
* Cipher-block chaining prevents patterns within messages&lt;br /&gt;
* Correct IV prevents patterns across messages&lt;br /&gt;
&lt;br /&gt;
Anti-pattern: Random Values&lt;br /&gt;
* Finding linear congruential seed&lt;br /&gt;
&lt;br /&gt;
Anti-pattern: Psuedo-random Session IDs&lt;br /&gt;
* really only ~20 bits of entropy&lt;br /&gt;
* HMACs and secure random&lt;br /&gt;
** do not use sessions - use HMACs - seriously&lt;br /&gt;
&lt;br /&gt;
No Cargo Cult Security:&lt;br /&gt;
# Identify true security goal.&lt;br /&gt;
# Find correct crypto primitive.&lt;br /&gt;
# Spend some time to learn about it.&lt;br /&gt;
# Write as little of your own crypto code as possible.&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>