|
|
Subscribe / Log in / New account

Intel's "redundant prefix issue"

Intel's "redundant prefix issue"

Posted Nov 16, 2023 12:30 UTC (Thu) by yaap (subscriber, #71398)
In reply to: Intel's "redundant prefix issue" by pizza
Parent article: Intel's "redundant prefix issue"

Absolutely.

Common Criteria (CC) certification requires keeping the design confidential for example. Why? Because it forces an attacker into reverse engineering the particular device design, which is not impossible but definitely costly. And this will deter many attackers, all those who cannot justify the effort. In most cases security is not a binary proposition, it's an economic equation between cost of attack and cost of defense. And then obscurity makes perfect sense as a way to increase the cost of attack.

Everybody agrees "security by obscurity" is bad for algorithm and protocols. These are long lived, and we want the more review possibly to ensure strength and lasting protection.

But when it comes to a specific implementation, some amount of obscurity can be good, and can even be a requirement (see the CC spec)

For CC, I don't remember at which level it kicks in but for EAL4+ and above design secrecy is a requirement for sure, with requirements on how to control access and enforce this too. So you want to do an EAL4+ system? You must show your offices are properly secured for example, and that there are protection against tampering the design over the whole chain, from design to manufacturing to production. And most of this must be confidential, with proper access control.

So yes, I wish people would stop pushing "security through obscurity = bad" as if it were insightful. First, when it applies (algos & protocols) it is no longer insightful, everybody knows. And then there are plenty legitimate cases where it does NOT apply.


to post comments

Intel's "redundant prefix issue"

Posted Nov 16, 2023 16:17 UTC (Thu) by Wol (subscriber, #4433) [Link]

+1

When I did some stuff like this, the security I designed (they didn't use it) was pretty rudimentary. But the logic was very simple:

"This stuff has an economic life of about 6 months. If it takes them six months to reverse engineer what we've done, the results will be worthless".

Yes, of course I built in all the security I could, with every *obvious* hardening trick I could think of. But at the end of day, the stuff I was protecting wasn't worth throwing loads of money at.

Cheers,
Wol


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds