Shop OBEX P1 Docs P2 Docs Learn Events
How important is public key encryption? — Parallax Forums

How important is public key encryption?

rjo_rjo_ Posts: 1,825
edited 2009-04-14 09:57 in General Discussion
I have a good reason for asking. And what I mean is ... does anyone still use it in really vital places for really vital purposes?... or is it mostly a way to keep the illusion that you can exchange internet porn without serious people knowing what you are doing?

Rich

Post Edited (rjo_) : 4/4/2009 11:05:27 PM GMT
«134

Comments

  • Phil Pilgrim (PhiPi)Phil Pilgrim (PhiPi) Posts: 23,514
    edited 2009-04-04 23:02
    It's vital for secure internet transactions, for one; so an entire commercial infrastructure depends on it. Why? Have you solved the prime factorization problem or something?

    -Phil
  • rjo_rjo_ Posts: 1,825
    edited 2009-04-04 23:04
    Well... then someone needs to inform these folks that they need to migrate to another form of encryption... and after they have done that let us know, because I'm planning to blow it up.
  • rjo_rjo_ Posts: 1,825
    edited 2009-04-04 23:09
    There are a variety of other encryption schemes available... they just need to pick one. And if they aren't smart enough to do that they need to get their businesses off the internet.
  • Phil Pilgrim (PhiPi)Phil Pilgrim (PhiPi) Posts: 23,514
    edited 2009-04-04 23:12
    LOL! Many have tried. None has succeeded — at least not without a supercomputer, and then only for shorter keys than are currently in use. What I mean to imply is that I hope you have a source of income that's independent of this new quest...

    -Phil
  • rjo_rjo_ Posts: 1,825
    edited 2009-04-04 23:26
    Not a source of income for me[noparse]:)[/noparse] And as far as I'm concerned it isn't responsible to yell fire ... even if there happens to be a fire... but it is also irresponsible to see the fire starting and not tell everyone to calmly make their way to the exits.

    We need to go to something else... and while I might not exactly blow it up... I'm certainly going to put enough info somewhere so that the good people get the message. And it isn't exactly news for the people who really need to know this stuff.... except that the circle of people who need to know changes with the times... and in these times, our business people need to know.

    Post Edited (rjo_) : 4/4/2009 11:31:56 PM GMT
  • rjo_rjo_ Posts: 1,825
    edited 2009-04-04 23:42
    And by the way... I don't know exactly how stuff gets encrypted ... the fact that people say they using public key encryption and appear to be using public key encryption doesn't mean that they actually are. If there actually is a heavy dependence in some sectors... those sectors are already at risk and have been for some time. The fact that they haven't been robbed is a reflection of the fact that this kind of security depends upon far more than just encryption. People have been able to pick locks for ages... and we still use them... but if we are really serious about keeping people out, we use a lot more than a lock.
  • Carl HayesCarl Hayes Posts: 841
    edited 2009-04-04 23:44
    Phil Pilgrim (PhiPi) said...
    LOL! Many have tried. None has succeeded — at least not without a supercomputer, and then only for shorter keys than are currently in use.
    Really, Phil?· Would they (NSA, for example)·tell you if they had broken it for long keys?· Me, I don't trust them.· NSA seems too eager for everyone to use RSA.

    Me, now, I use OTP.· And I use it correctly.· It has none of the convenience of public-key encryption, but (unlike RSA) there is no (published, anyway) way to attack it unless it is used incorrectly (as the Russians did in WW2, when they reused keypads once, and the keys weren't truly random, with the result that Roy·Phillips and Genevieve Grotjan broke the Soviet codes in November 1944.· Genevieve Grotjan was the same person who had come up with the key insight that made possible the breaking of the Japanese "purple" machine several years earlier.

    For a few months in early 1942 the KGB, under pressure of wartime shortages, had printed duplicate copies of pages and bound them, often wih different page numbers, into separate one-time pads.

    The OTPs weren't random because the Russians created them by having typists pound keys "at random", but they weren't really random because the typists unconsciously avoided double digits and because they alternated right and left hands, so that certain combinations (like 34, both left hand) occurred rarely.

    And that was all it took for Grotjan and Phillips to read their encrypted messages.

    The history of encryption is very interesting.

    ******· Edit:· Oops, Cecil Phillips, not Roy Phillips.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    · -- Carl, nn5i@arrl.net

    Post Edited (Carl Hayes) : 4/5/2009 1:06:29 AM GMT
  • rjo_rjo_ Posts: 1,825
    edited 2009-04-04 23:52
    I was allowed to publish a little about it on a government sponsored web site... the people who allowed it knew the exact significance. The correspondance was open and thoroughly international. I am not in the habit of making mistakes with stuff like this.

    I doubt that I discovered anything that wasn't already known... and the folks that review stuff like this decided to let it go.
  • Phil Pilgrim (PhiPi)Phil Pilgrim (PhiPi) Posts: 23,514
    edited 2009-04-05 00:53
    Can you provide a link?

    -Phil
  • Dave HeinDave Hein Posts: 6,347
    edited 2009-04-05 01:59
    rjo_,

    Could you provide more information on your concern about public key encryption?· Does it have to do with the key size, or is it the Diffie-Hellman algorithm, man-in-the-middle attacks, or does it concern the private key that is generated?· It doesn't help to be so mysterious about it.· If you are aware of a weakness in the public key encryption algorithm it would be good to publisize it so that it can be corrected.

    Dave
  • Phil Pilgrim (PhiPi)Phil Pilgrim (PhiPi) Posts: 23,514
    edited 2009-04-05 02:24
    I agree. So far we've been served up a lot of foam and froth. It's time to taste the ale that supposedly lies underneath. Otherwise, incredulity is the only logical recourse.

    -Phil
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-05 02:45
    has someone built a quantum computer? that would make all encryption algorithms useless.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • DufferDuffer Posts: 374
    edited 2009-04-05 03:02
    Sneakers, the movie.· http://www.imdb.com/title/tt0105435/

    Duffer

    Post Edited (Duffer) : 4/5/2009 3:10:29 AM GMT
  • Carl HayesCarl Hayes Posts: 841
    edited 2009-04-05 04:07
    mctrivia said...
    has someone built a quantum computer? that would make all encryption algorithms useless.

    True.· Then the only one·left would be the one not based upon an algorithm.· OTP, that is.· It would still be secure.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    · -- Carl, nn5i@arrl.net
  • Phil Pilgrim (PhiPi)Phil Pilgrim (PhiPi) Posts: 23,514
    edited 2009-04-05 04:21
    Carl, I'm curious to know how you actually use a one-time pad. Is it for "hobby" communication, or are you able to incorporate it somehow into more serious internet transactions?

    Also, by way of clarification, I believe that secure HTTP uses RSA only for the exchange of keys for DES encryption and that DES is used to encrypt any actual data that's exchanged.

    (BTW, this diversion should, by no means, be contrued to let Rich off the hook. It's still PUOSU time for that guy! smile.gif )

    -Phil
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-05 05:14
    I am sure it is not des. Des is a very week 56bit encryption with known weeknesses and has been hacked by distributed.net in about 10 hours


    but then again wep can be hacked in 5 min yet lots of people still use it.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • Phil Pilgrim (PhiPi)Phil Pilgrim (PhiPi) Posts: 23,514
    edited 2009-04-05 05:29
    Apparently, triple-DES is considerd the strongest cipher suite used in SSL tranactions, once the RSA key exchange has taken place: docs.sun.com/source/816-6156-10/contents.htm.

    ('Still waiting for Rich's supporting link or documentation...)

    -Phil

    Post Edited (Phil Pilgrim (PhiPi)) : 4/5/2009 5:34:42 AM GMT
  • Carl HayesCarl Hayes Posts: 841
    edited 2009-04-05 07:20
    Phil Pilgrim (PhiPi) said...
    Carl, I'm curious to know how you actually use a one-time pad. Is it for "hobby" communication, or are you able to incorporate it somehow into more serious internet transactions?

    Also, by way of clarification, I believe that secure HTTP uses RSA only for the exchange of keys for DES encryption and that DES is used to encrypt any actual data that's exchanged.

    (BTW, this diversion should, by no means, be contrued to let Rich off the hook. It's still PUOSU time for that guy! smile.gif )

    -Phil
    Actually, I've been using the term RSA in a not quite correct way; your description is better.· Really I mean to refer to all popular systems that rely on large primes and can be defeated by factoring.

    Such systems rely on the idea that it would take decades, with the fastest goodies, to factor a product of large primes.· But NSA has known that for decades; has the fastest goodies of all; and surely has been building tables of primes, and products of two primes, to lengths well beyond anything in use.· I'm sure they could have started doing that decades ago; I'm sure they knew decades ago that they needed to do it; and so I'm sure it makes sense to assume they have done it.· So I think they can routinely break, in seconds, any public-key message of which they are given either the public or the private key.· That includes RSA, DES, and all that other garp.

    I'm also sure they wouldn't say they could do, or have done, any of that.

    I use OTP to exchange information with my attorney, an old friend who also is interested in cryptography -- and with some other friends too.· It's inconvenient, because I must first·develop long random strings for keyfiles.· I wrote a program that develops 3GB random strings for this purpose, but each string takes a week or so to produce.· Faster hardware won't help, because the method relies on inherently random naturally-occurring physical events outside the computer.· I must create these key sequences, embed them in keyfiles appropriately formatted for my programs, and deliver them physically to anyone with whom I intend to exchange secure communications.· It would be no good sending the keyfiles by e-mail, would it?

    The system also must provide for the utter destruction of·keyfile information immediately after using it, either for encryption or for decryption.· Otherwise, a "black bag" operation could obtain a copy of a keyfile and use it to decrypt past ciphertext, and future ciphertext too if I don't detect the intrusion.· One result is that I cannot myself decrypt anything I have encrypted, and my correspondent can decrypt it only once.·

    Such a system would be useless for Internet commerce, of course.·

    Anyway, some years ago I deeloped a whole software system to do all that.· It's all in PC assembler.· One virtue is that knowing how it works, or even· having copies of the programs, is useless for defeating it.· You've got to possess the keyfiles, and they're destroyed at both ends as an immediate result of using them.· They're truly random, not pseudorandom, so they can't be recreated by any process.· When a keyfile is used, only the portion that was used is destroyed -- so, for instance, a 3GB keyfile and its single copy·can be used for encrypting/decrypting, say, 100 messages of 30MB each; and so forth.

    One useful feature is that the programs will not permit use of a particular keyfile for encryption after it has been used for decryption, or vice versa.· That prevents the error condition in which he and I both encrypt stuff with our copies of the same keyfile, which would mean that neither of us could decrypt it because the same part of the keyfile was used and·destroyed -- that would be another kind of deadly embrace.

    Also, if on the decrypting end you nominate the wrong keyfile, the programs will detect that, and reject it.

    The worst mistake would be to keep these keyfiles on any storage that is ever backed up.· We don't do that.· At least, I don't -- and since my usual correspondent has an IQ that is in about the one-in-ten-million range, higher than mine, I'm sure he doesn't either.

    Cryptology, and cryptanalysis, are great fun.· And I agree, we mustn't let rjo_ off the hook.

    ·

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    · -- Carl, nn5i@arrl.net

    Post Edited (Carl Hayes) : 4/5/2009 7:41:03 AM GMT
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-05 08:09
    i wrote an encryption algorithm about a decade ago around a 12 dimensional fractal. Key lengths were variable in length up to the length of your file. It was super slow though.

    Don't ask for the code I don't have it any more but the idea is simple. Take the mandelbrought set and several other fractals and combine them to make super multi dimensional fractals. Use DES algorithm as a randomizer of the fractal points between iterations. In this way you can generate a psudo random table of bits of any length with any length of input key. The table can then just be xor with your data to encrypt or decrypt the data.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-05 08:14
    I wrote a very simple encryption/compression algorithm that is so simple at encrypting text that it should be easy to crack but it isn't.


    generate a table of letters, words, and phrases used in your writing. a sign each a variable length binary value using hufman algorithm.

    hand deliver the key file to each side

    simple. but if you make your key file with enough full words in it represented by a single symbol cracking methods get difficult since every symbol has a variable length.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • Carl HayesCarl Hayes Posts: 841
    edited 2009-04-06 00:12
    mctrivia said...
    I wrote a very simple encryption/compression algorithm that is so simple at encrypting text that it should be easy to crack but it isn't.


    generate a table of letters, words, and phrases used in your writing. a sign each a variable length binary value using hufman algorithm.

    hand deliver the key file to each side

    simple. but if you make your key file with enough full words in it represented by a single symbol cracking methods get difficult since every symbol has a variable length.

    Actually (I could be wrong) that sounds very easy to crack.· It's like late 19th century tactical ciphers, but without additives.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    · -- Carl, nn5i@arrl.net
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-06 01:26
    as I said so simple it should be easy but depending on key file it often was not.

    my key file dId have over 200000 symbols words or phrases

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • kwinnkwinn Posts: 8,697
    edited 2009-04-06 02:51
    The problem with any encryption method that always uses the same symbol to represent a clear text symbol, whether the clear text symbol is a single character or a word is that it is susceptible to frequency analysis. Both letters and words tend to appear with certain frequencies in a language.
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-06 03:01
    i know. I have a table of the statistical frequencys to which words and letters and combinations of letters should appear. I was surprised no one I sent the raw encoded streams code decode even with me encrypting the entire chapter 1 of Genesis.

    When using in reality I was encoding the data into the least significant bit of each color of each pixel in a picture. When looking at the picture you can not even see the difference to even think data was coded there. Only problem was I was using bitmaps. Would have been cool to use jpg but did not know how they worked well enough to write a custom encoder/decoder.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • Carl HayesCarl Hayes Posts: 841
    edited 2009-04-06 03:07
    That's a neat idea. I've done that with WAV files before. WAV file structure is well published. At length I decided, though, that sending a WAV file with the real info in only one out of 16 bits was too inefficient. I had to send more than 16 megabytes to hide each megabyte of plaintext. With my OTP system it's nearly one-to-one.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    · -- Carl, nn5i@arrl.net
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-06 03:39
    since my key file was so large i could encode entire sentences into a single 32bit symbol if it was in the table.

    The purpose for it was to get past the screening at work. I could easily send emails with pictures attached and get them back. It was more for fun then anything since I also had access to the dataloger and could just remove traces of the packets from the log if I really cared.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • mctriviamctrivia Posts: 3,772
    edited 2009-04-06 03:41
    I do like your OTP idea. It could benefit from a combination of the two. My idea has great compression capability. OTP could then encode the compressed document.

    By the way though in my chalenge to several code breakers I knew I encoded Genesis 1 with 1 key file. When I was using this I did change the key file once a week.

    ▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
    Need to make your prop design easier or secure? Get a PropMod has crystal, eeprom, and programing header in a 40 pin dip 0.7" pitch module with uSD reader, and RTC options.
  • rjo_rjo_ Posts: 1,825
    edited 2009-04-06 07:18
    I'm not ignoring you guys or playing hard to get... right after I started the conversation my weekend got blown up by my kids...
    I've log more miles in the last two days than a crack addict in montana. I was shocked to see the number of replies and promise to respond one by one.

    You guys are great.

    ILMP

    Rich
  • kwinnkwinn Posts: 8,697
    edited 2009-04-06 14:04
    mctrivia, your idea of encoding data into the lsb of each color pixel in a picture is called steganography, and unfortunately it is very simple to detect. Any picture that has a message encoded within it is virtually incompressible. Take a picture and compress it using zip, then encode a message in it and try compressing it again to see what I mean. Zip is also a steganography encryption detector.

    Once you know there is a message encoded in a picture it is very simple to extract it, and then it can be analyzed by standard decryption methods.

    Unfortunately the only truly sure method of encryption at present is the one time pad, and then only if that is done properly, which is very inconvenient.
  • kwinnkwinn Posts: 8,697
    edited 2009-04-06 14:07
    By the way, using a wave file to encode the data is no different than using a picture file.
Sign In or Register to comment.