The European Tribune is a forum for thoughtful dialogue of European and international issues. You are invited to post comments and your own articles.
Please REGISTER to post.
Math Advances Raise the Prospect of an Internet Security Crisis | MIT Technology Review
Alex Stamos, chief technology officer of the online security company Artemis, led a presentation describing how he and three other security researchers studied recent publications from the insular world of academic cryptopgraphy research, which covers trends in attacking common encryption schemes. "Our conclusion is there is a small but definite chance that RSA and classic Diffie-Hellman will not be usable for encryption purposes in four to five years," said Stamos, referring to the two most commonly used encryption methods.
Alex Stamos, chief technology officer of the online security company Artemis, led a presentation describing how he and three other security researchers studied recent publications from the insular world of academic cryptopgraphy research, which covers trends in attacking common encryption schemes.
"Our conclusion is there is a small but definite chance that RSA and classic Diffie-Hellman will not be usable for encryption purposes in four to five years," said Stamos, referring to the two most commonly used encryption methods.
RSA and Diffie-Hellman encryption are both underpinned by a mathematical challenge known as the discrete logarithm problem. That problem is computationally difficult to solve, ensuring that encrypted data can only be decoded quickly with knowledge of the secret key used to encode it in the first place. Breaking RSA or Diffie-Hellman encryption today requires using vast computing resources for significant periods of time.However, it is possible that algorithms able to solve the discrete logarithm problem quickly could exist. "We rely on that efficient algorithm not being found," said Jarved Samuel, a cryptographer who works for security consultancy ISEC Partners and presented alongside Stamos. "If it is found the cryptosystem is broken."
RSA and Diffie-Hellman encryption are both underpinned by a mathematical challenge known as the discrete logarithm problem. That problem is computationally difficult to solve, ensuring that encrypted data can only be decoded quickly with knowledge of the secret key used to encode it in the first place. Breaking RSA or Diffie-Hellman encryption today requires using vast computing resources for significant periods of time.
However, it is possible that algorithms able to solve the discrete logarithm problem quickly could exist. "We rely on that efficient algorithm not being found," said Jarved Samuel, a cryptographer who works for security consultancy ISEC Partners and presented alongside Stamos. "If it is found the cryptosystem is broken."
The next cryptography frontier is supposed to be elliptic curve cryptography (ECC). The kicker?
The U.S. National Security Agency has for years recommended ECC as the most reliable cryptographic protection available. In 2005 the agency released a toolkit called SuiteB featuring encryption algorithms to be used to protect government information. SuiteB makes use of ECC and eschews RSA and Diffie-Hellman. A classified encryption toolkit, SuiteA, is used internally by the NSA and is also believed to be based on ECC.
Who here has a USBdongle from their bank? A code card? Some physical item supposed to help with the security of your ebanking needs? That item might as well be a read-once memory stick. Heck, if I am reading traffic use right, you could encode your world of warcraft account in this way with approximately the same amount of hassle as is currently expended protecting those accounts. Except this would be guaranteed to actually work against all hacking strategies short of "Break into your place, steal your hardware".
You can hide information in anything - Tweets, Amazon feedback, EBay bids, blog comments, lolcat pics, videos, porn, banner ads, the time a given IP address reloads a web page.
Etc.
You don't even have to use steganography. Like email, it just happens to be convenient.
As long as you can agree a code, you can exchange your key using pretty much any traffic on the Internet.
- Jake Friends come and go. Enemies accumulate.
Take USB stick. Mold a clay figure or tablet around it. Sunbake it.
A cast or formed metal brass or pewter decorative paper weight would do fine -- unless the authorities became suspicious of the sender or recipient, as acoustic or even more sophisticated inspection might be used. A Dremel tool would suffice to open the base in the appropriate place. If one desired to reuse the object just have a back piece that is soldered around the entire bottom edge. But this is getting to be non trivial. "It is not necessary to have hope in order to persevere."
.. If you insist on securely locked down lifelogs (.. and the police and security might have good uses for that) it is still trivial, only now you have to actually get new keys once a month or so.
by Frank Schnittger - Mar 11 11 comments
by Frank Schnittger - Mar 8 3 comments
by Frank Schnittger - Mar 6 4 comments
by gmoke - Mar 7
by Frank Schnittger - Mar 2 1 comment
by Frank Schnittger - Mar 5 2 comments
by gmoke - Feb 25
by Oui - Mar 241 comment
by Oui - Mar 23
by Oui - Mar 231 comment
by Oui - Mar 21
by Oui - Mar 191 comment
by Oui - Mar 19
by Oui - Mar 18
by Oui - Mar 175 comments
by Oui - Mar 16
by Oui - Mar 164 comments
by Oui - Mar 1510 comments
by Oui - Mar 155 comments
by Oui - Mar 147 comments
by Oui - Mar 1312 comments
by Oui - Mar 12
by Oui - Mar 1113 comments
by Frank Schnittger - Mar 1111 comments
by Oui - Mar 1116 comments
by Oui - Mar 109 comments
by Frank Schnittger - Mar 104 comments