[cryptography] Application Layer Encryption Protocols Tuned for Cellular?

Jeffrey Walton noloader at gmail.com
Sun Nov 4 17:45:47 EST 2012


On Sat, Nov 3, 2012 at 9:08 PM,  <dan at geer.org> wrote:
>
>  > ...
>  > In practice, the 7 layer model was not an implementation recipe - TCP/IP
>  > in the broader Internet sense showed that engineering required working
>  > with the tech of the time, not the abstractions from some CS class or
>  > government contract sales team.  TCP in the narrow sense shows it again
>  > - sticking TCP in layer 4 and stopping there doesn't work - it claims
>  > everything is a stream, when 'everything is a datagram' is closer to the
>  > truth, and a more useful assumption.  TCP further assumes it can
>  > reliably deliver data, when actually it's only reliable enough if you
>  > care only enough to do the demo.
>  > ...
>
> I don't know what to think of the following, but it may be germane:
>
> http://rina.tssg.org/docs/JohnDay-LostLayer120306.pdf
Somewhat off topic, but Day has another good presentation at
http://csr.bu.edu/rina/KoreaHowtoCleanASlate100219.pdf.

* Mobility is cumbersome and doesn’t scale
  - Excuse: What do you mean? It works. . . . . Sort of.
  - Actual: With only physical addresses, hard to do “re-locatable” addressing



More information about the cryptography mailing list