Title :
Fairy dust, secrets, and the real world [computer security]
Author_Institution :
Dept. of Comput. Sci., Dartmouth Coll., Hanover, NH, USA
Abstract :
Computation must exist in the physical world. Security designs that require secrets must hide and use them in the real world. Unfortunately, the real world offers more paths to secret storage and more observable computational artifacts than these security designs anticipate. Careful integration of physical defenses and security architecture can sometimes succeed against the adversary class designers consider. However, in the long term, we hope for either a quantum leap in physically defensible technology-or a significant reduction in the properties that designs force us to assume about our computers.
Keywords :
computer crime; cryptography; security of data; computational artifacts; physical defenses; physically defensible technology; secret storage; security architecture; security designs; Computer architecture; Computer security; Coprocessors; Cryptographic protocols; Cryptography; Electronic mail; Hardware; Identity-based encryption; Privacy; Protection;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSECP.2003.1177003