Problem 8: Designing a secure application is even harder
Protocol is only a mathematical abstraction
Application designer must:
- select an appropriate, correct, protocol
- find out the assumptions and meet them
- unfortunately, we can’t rely on formal methods
Even simple examples are difficult
- No one really knows if any crypto applications are really secure in practice