- Why is this important today?
- Security of communication and transactions
- Verification
- A Senator said that technology companies need to “get on with it” and create a version of back-doored encryption or they will impose their will on them.
- The bad guys: Terrorists and child predators
- The history of encryption
- Secret messages are an old idea
- Caesar cypher - used in the time of Julius Caesar
- Code words and numeric substitutions
- Modern encryption
- Security through obscurity vs publicly known methods
- One Time Pads
- Digital methods
- Everything is a number
- All numbers can be written in binary
- XOR - reversible encoding: One time pads
- Symmetric encryption
- Hashes
- CSPRNG - Getting real random numbers
- Public Key encryption (asymmetric)
- Public key - Encryption
- Private key - Decryption and Signatures
- Prime number relationship
- What’s a prime number? What’s a composite?
- Prime factorization
- RSA was first but there are others
- Diffie-Hellman (Merkle) Key exchange
- Allow two parties to come up with a shared secret when someone is listening in
- Based on doing some math based on remainders
- There are other key exchanges that do a similar job
- You can use a signature with a known public key to ensure that you’re talking to the right person
- Re-do the process whenever you want: Perfect Forward Security
- Strength of Encryption
- 56b keys vs 128b keys vs 256b keys
- How do we know? Each bit doubles
- “Broken” encryption
- The math is designed with two parties in mind. We don’t have good multi-party math. Options:
- When encrypting/signing, generate a new key then encrypt that with multiple keys
- Multi-user keys
- SSSS - Shamir’s Secret Sharing Scheme
- Keeping keys safe
- Fire and elevator keys
- Often specified in building codes
- Easily obtainable
- Require you to be on-site, limited to what is there
- Digital version of those keys
- Small, easy to replicate
- Will need to be specified in code
- Can be used from anywhere
- Extremely high value
- Even the NSA has leaks and mistakes
- We don’t have a safe way to limit this
- This technology is well known and is not difficult to implement for someone who can follow some instructions
- The keys will leak
- Dragnet surveillance gets harder but normal police work remains the same
References
Article on Congress wanting back doors
Most of the content of this episode came from memory. I didn’t have many specific references outside of Wikipedia.
Intro music provided by Purple Planet