Safecracking for the computer scientist∗

نویسنده

  • Matt Blaze
چکیده

This paper is a general survey of safe and vault security from a computer science perspective, with emphasis on the metrics used to evaluate these systems and the weaknesses that cause them to fail. We examine security against forced, covert and surreptitious safe opening, focusing on the mechanical combination locks most commonly used on commercial safes in the US. Our analysis contrasts the philosophy and tools of physical security with those of information security, especially where techniques might be profitably applied across these disciplines. 1 Safe and vault security: a computer science perspective There is an undeniable mystique surrounding safes and vaults. Containers to safeguard valuables and secrets from theft and prying eyes have existed almost as long as the concepts of valuables and secrets themselves, and yet in spite of the “Internet age,” details of safes and the methods used to defeat them remain shrouded in obscurity and even a certain amount of mystery. Safe security is a delicate, almost perilous subject, protected by a near reverence that extends, in our imaginations at least, across both sides of the law. Safecrackers are perhaps the most romantic and “professional” of thieves, conjuring images of meticulously planned and executed exploits straight out of Hollywood screenplays. And among the law-abiding, safe and vault technicians (safe men in the traditional parlance) are perceived as an elite, upper echelon of the locksmithing community whose formidable trade is surely passed on only to the most trustworthy and dedicated. Reverence for safe work can even be found in the trade’s own internal literature, with an almost unavoidable, if subtle, swagger accompanying mastery of safe opening technique. The title of a venerable locksmithing treatise on the subject – The Art of Manipulation[LK55] — signals a discipline that demands artistry, not mere craft. Its text begins with a warning to faithfully guard the material in its pages, as well as the suggestion that the book be destroyed completely after its techniques are learned. (Fortunately, some readers have ignored that advice, and a few copies remain available through interlibrary loan). The ambiguity in the term manipulation itself seems oddly appropriate here, evoking perhaps a “lock whisperer,” with the safe somehow persuaded to open against its better judgment, only to regret it later. ∗All text and images c ©2004 by Matt Blaze; all rights reserved unauthorized use or publication, whether for commercial or non-commercial purposes, is prohibited.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bayesian perspective over time

Thomas Bayes, the founder of Bayesian vision, entered the University of Edinburgh in 1719 to study logic and theology. Returning in 1722, he worked with his father in a small church. He also was a mathematician and in 1740 he made a novel discovery which he never published, but his friend Richard Price found it in his notes after his death in 1761, reedited it and published it. But until L...

متن کامل

Intelligent Vehicle Highway Systems (Ivhs) Issues and Recommendations

Intelligent Vehicle Highway Systems (IVHS) is the integration of various pieces of information and computer technologies to the transportation elements in order to obtain a more productive transportation system. The five major components of IVHS are the Advanced Traffic Management Systems (ATMS), Advanced Vehicle Control Systems (AVCS), and Advanced Public Transportation systems (APTS). This pa...

متن کامل

Teaching Logic for Computer Science: Are We Teaching the Wrong Narrative?

In this paper I discuss what, according to my long experience, every computer scientist should know from logic. We concentrate on issues of modeling, interpretability and levels of abstraction. We discuss what the minimal toolbox of logic tools should look like for a computer scientist who is involved in designing and analyzing reliable systems. We shall conclude that many classical topics dear...

متن کامل

Constructive emergence: a computer scientist looks at philosophy

1. WHY DO PHILOSOPHERS BUT NOT COMPUTER SCIENTISTS FIND EMERGENCE MYSTERIOUS? My paper last year [1] compared styles of thought in computer science and engineering. This year I compare computer science with philosophy. (As you might guess, I’m a computer scientist. I acknowledge from the start that this paper is a bit “in-yourface.”) Since philosophy is such a broad discipline, I’m limiting mys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004