RE: Fixing the algorithm

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Title: RE: Fixing the algorithm

This is simply another class of imlementation error.

Things happen, mistakes are made. The question is will people learn from them.

There is an entire litterature of cryptographically secure election protocols that is 100% useless because the wrong requirements are considered. Take a look at recent electoral complaints in venezuela and the us.

In both cases and here the problem is schemes that are too reliant on crypto for security.


Sent from my GoodLink Wireless Handheld (www.good.com)

 -----Original Message-----
From:   Yaakov Stein [mailto:yaakov_s@xxxxxxx]
Sent:   Friday, September 01, 2006 02:42 AM Pacific Standard Time
To:     Hallam-Baker, Phillip; Eastlake III Donald-LDE008; IETF-Discussion
Subject:        RE: Fixing the algorithm


> "The philosophers have analysed the IETF election process in many
ways, the point is to change it"

Actually, the entire process was pre-analyzed in RFC 3979,
but the analysis was ignored.

As RFC 3797 specifically says, the fair and unbiased method
is to order the candidates using a random process of sufficient entropy,
and then select the first ten to serve on the NONCOM.
Should one of the 10 turn out to be ineligible or decline to serve
or be disqualified for any reason, the next (11th) candidate is added
to the NONCOM.

As has been stated here on several ocassions,
the fairness is destroyed by giving any latitude to anyone
(NONCOM chair, ISOC president, etc) to influence the outcome.

Y(J)S

_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]