Cyphernomicon Index
Cyphernomicon 5.5

Cryptology:
Cryptology-Technical, Mathematical


    5.5.1. Historical Cryptography
           + Enigma machines
             - cracked by English at Bletchley Park
             - a secret until mid-1970s
             + U.K. sold hundreds of seized E. machines to embassies,
                governments, even corporations, in late 1940s, early
                1950s
               - could then crack what was being said by allies
           + Hagelin, Boris (?)
             - U.S. paid him to install trapdoors, says Kahn
             + his company, Crypto A.G., was probably an NSA front
                company
               - Sweden, then U.S., then Sweden, then Zug
             - rotor systems cracked
    5.5.2. Public-key Systems--HISTORY
           + Inman has admitted that NSA had a P-K concept in 1966
             - fits with Dominik's point about sealed cryptosystem boxes
                with no way to load new keys
             - and consistent with NSA having essentially sole access to
                nation's top mathematicians (until Diffies and Hellmans
                foreswore government funding, as a result of the anti-
                Pentagon feelings of the 70s)
           - Merkle's "puzzle" ideas, circa mid-70s
           - Diffie and Hellman
           - Rivest, Shamir, and Adleman
    5.5.3. RSA and Alternatives to RSA
           + RSA and other P-K patents are strangling development and
              dissemination of crypto systems
             - perhaps out of marketing stupidity, perhaps with the help
                of the government (which has an interest in keeping a
                monopoly on secure encryption)
           + One-way functions and "deposit-only envelopes"
             - one-way functions
             - deposit-only envelopes: allow additions to envelopes and
                only addressee can open
           - hash functions are easy to implement one-way functions
              (with no need for an inverse)
    5.5.4. Digital Signatures
           + Uses of Digital Signatures
             - Electronic Contracts
             - Voting
             - Checks and other financial instruments (similar to
                contracts)
             - Date-stamped Transactions (augmenting Notary Publics)
           - Undeniable digital signatures
           + Unforgeable signatures, even with unlimited computational
              power, can be achieved if the population is limited (a
              finite set of agents)
             - using an untraceable sending protocol, such as "the
                Dining Cryptographers Problem" of Chaum
    5.5.5. Randomness and incompressibility
           + best definition we have is due to Chaitin and Kolmogoroff:
              a string or any structure is "random" if it has no shorter
              description of itself than itself.
             - (Now even specific instances of "randomly generated
                strings" sometimes will be compressible--but not very
                often. Cf. the works of Chaitin and others for more on
                these sorts of points.)
    5.5.6. Steganography: Methods for Hiding the Mere Existence of
            Encrypted Data
           + in contrast to the oft-cited point (made by crypto purists)
              that one must assume the opponent has full access to the
              cryptotext, some fragments of decrypted plaintext,  and to
              the algorithm itself, i.e., assume the worst
             - a condition I think is practically absurd and unrealistic
             - assumes infinite intercept power (same assumption of
                infinite computer power would make all systems besides
                one-time pads breakable)
             - in reality, hiding the existence and form of an encrypted
                message is important
             + this will be all the more so as legal challenges to
                crypto are mounted...the proposed ban on encrypted
                telecom (with $10K per day fine), various governmental
                regulations, etc.
               - RICO and other broad brush ploys may make people very
                  careful about revealing that they are even using
                  encryption (regardless of how secure the keys are)
           + steganography, the science of hiding the existence of
              encrypted information
             - secret inks
             - microdots
             - thwarting traffic analysis
             - LSB method
           + Packing data into audio tapes (LSB of DAT)
             + LSB of DAT: a 2GB audio DAT will allow more than 100
                megabytes in the LSBs
               - less if algorithms are used to shape the spectrum to
                  make it look even more like noise
               - but can also use the higher bits, too (since a real-
                  world recording will have noise reaching up to perhaps
                  the 3rd or 4th bit)
               + will manufacturers investigate "dithering"  circuits?
                  (a la fat zero?)
                 - but the race will still be on
           + Digital video will offer even more storage space (larger
              tapes)
             - DVI, etc.
             - HDTV by late 1990s
           + Messages can be put into GIFF, TIFF image files (or even
              noisy faxes)
             - using the LSB method, with a 1024 x 1024 grey scale image
                holding 64KB in the LSB plane alone
             - with error correction, noise shaping, etc., still at
                least 50KB
             - scenario: already being used to transmit message through
                international fax and image transmissions
           + The Old "Two Plaintexts" Ploy
             - one decoding produces "Having a nice time. Wish you were
                here."
             - other decoding, of the same raw bits, produces "The last
                submarine left this morning."
             - any legal order to produce the key generates the first
                message
             + authorities can never prove-save for torture or an
                informant-that another message exists
               - unless there are somehow signs that the encrypted
                  message is somehow "inefficiently encrypted, suggesting
                  the use of a dual plaintext pair method" (or somesuch
                  spookspeak)
             - again, certain purist argue that such issues (which are
                related to the old "How do you know when to stop?"
                question) are misleading, that one must assume the
                opponent has nearly complete access to everything except
                the actual key, that any scheme to combine multiple
                systems is no better than what is gotten as a result of
                the combination itself
           - and just the overall bandwidth of data...
           + Several programs exist:
             - Stego
             - etc. (described elsewhere)
    5.5.7. The Essential Impossibility of Breaking Modern Ciphers and
            Codes
           - this is an important change from the past (and from various
              thriller novels that have big computers cracking codes)
           - granted, "unbreakable" is a misleading term
           + recall the comment that NSA has not really broken any
              Soviet systems in many years
             - except for the cases, a la the Walker case, where
                plaintext versions are gotten, i.e., where human screwups
                occurred
           - the image in so many novels of massive computers breaking
              codes is absurd: modern ciphers will not be broken (but the
              primitive ciphers used by so many Third World nations and
              their embassies will continue to be child's play, even for
              high school science fair projects...could be a good idea
              for a small scene, about a BCC student who has his project
              pulled)
           + But could novel computational methods crack these public
              key ciphers?
             + some speculative candidates
               + holographic computers, where large numbers are
                  factored-or at least the possibilities are somehown
                  narrowed-by using arrays that (somehow) represent the
                  numbers to be factored
                 - perhaps with diffraction, channeling, etc.
               - neural networks and evolutionary systems (genetic
                  algorithms)
             - the idea is that somehow the massive computations can be
                converted into something that is inherently parallel
                (like a crystal)
             + hyperspeculatively: finding the oracle for these problems
                using nonconventional methods such as ESP and lucid
                dreaming
               - some groups feel this is worthwhile
    5.5.8. Anonymous Transfers
           - Chaum's digital mixes
           - "Dining Cryptographers"
           + can do it with exchanged diskettes, at a simple level
             - wherein each person can add new material
             + Alice to Bob to Carol....Alice and Carol can conspire to
                determine what Bob had added, but a sufficient "mixing"
                of bits and pieces is possible such that only if
                everybody conspires can one of the participants be caught
               - perhaps the card-shuffling results?
           + may become common inside compute systems...
             - by this vague idea I mean that various new OS protocols
                may call for various new mechanisms for exchanging
                information
    5.5.9. Miscellaneous Abstract Ideas
           - can first order logic predicates be proven in zero
              knowledge?
           - Riemannn hypothesis
           + P = NP?
             - would the universe change?
             - Smale has shown that if the squares have real numbers in
                them, as opposed to natural numbers (integers), then P =
                NP; perhaps this isn't surprising, as a real implies sort
                of a recursive descent, with each square having unlimited
                computer power
             + oracles
               - speculatively,  a character asks if Tarot cards, etc.,
                  could be used (in addition to the normal idea that such
                  devices help psychologically)
               - "a cascade of changes coming in from hundreds of
                  decimal places out"
           + Quantum cryptography
             - bits can be exchanged-albeit at fairly low
                efficiencies-over a channel
             - with detection of taps, via the change of polarizations
             + Stephen Wiesner wrote a 1970 paper, half a decade before
                the P-K work, which outlined this-not published until
                much later
               - speculate that the NSA knew about this and quashed the
                  publication
           + But could novel computational methods crack these public
              key ciphers?
             + some speculative candidates
               + holographic computers, where large numbers are
                  factored-or at least the possibilities are somehown
                  narrowed-by using arrays that (somehow) represent the
                  numbers to be factored
                 - perhaps with diffraction, channeling, etc.
               - neural networks and evolutionary systems (genetic
                  algorithms)
             - the idea is that somehow the massive computations can be
                converted into something that is inherently parallel
                (like a crystal)
             + hyperspeculatively: finding the oracle for these problems
                using nonconventional methods such as ESP and lucid
                dreaming
               - some groups feel this is worthwhile
           - links to knot theory
           - "cut and choose" protocols (= zero knowledge)
           + can a "digital coin" be made?
             - this is formally similar to the idea of an active agent
                that is unforgeable, in the sense that the agent or coin
                is "standalone"
             + bits can always be duplicated (unless tied to hardware,
                as with TRMs), so must look elsewhere
               + could tie the bits to a specific location, so that
                  duplication would be obvious or useless
                 - the idea is vaguely that an agent could be placed in
                    some location...duplications would be both detectable
                    and irrelevant (same bits, same behavior,
                    unmodifiable because of digital signature)
           + coding theory and cryptography at the "Discrete
              Mathematics"
             - http://www.win.tue.nl/win/math/dw/index.html
   5.5.10. Tamper-resistant modules (TRMs) (or tamper-responding)
           + usually "tamper-indicating", a la seals
             - very tough to stop tampering, but relatively easy to see
                if seal has been breached (and then not restored
                faithfully)
             - possession of the "seal" is controlled...this is the
                historical equivalent to the "private key" in a digital
                signature system, with the technological difficulty of
                forging the seal being the protection
           + usually for crypto. keys and crypto. processing
             - nuclear test monitoring
             - smart cards
             - ATMs
           + one or more sensors to detect intrusion
             - vibration (carborundum particles)
             - pressure changes (a la museum display cases)
             - electrical
             - stressed-glass (Corning, Sandia)
           + test ban treaty verification requires this
             - fiber optic lines sealing a missile...
             - scratch patterns...
             - decals....
           + Epoxy resins
             - a la Intel in 1970s (8086)
             + Lawrence Livermore: "Connoisseur Project"
               - gov't agencies using this to protect against reverse
                  engineering, acquisition of keys, etc.
             + can't stop a determined effort, though
               - etches, solvents, plasma ashing, etc.
               - but can cause cost to be very high (esp. if resin
                  formula is varied frequently, so that "recipe" can't be
                  logged)
             + can use clear epoxy with "sparkles" in the epoxy and
                careful 2-position photography used to record pattern
               - perhaps with a transparent lid?
           + fiber optic seal (bundle of fibers, cut)
             - bundle of fibers is looped around device, then sealed and
                cut so that about half the fibers are cut; the pattern of
                lit and
                unlit fibers is a signature, and is extremely difficult
                to reproduce
           - nanotechnology may be used (someday)
  

Next Page: 5.6 Crypto Programs and Products
Previous Page: 5.4 Crypto Basics

By Tim May, see README

HTML by Jonathan Rochkind