Big Brother is reading: cryptography in the digital world.
|
||||||||||||||||||||||||
|
||||||||||||||||||||||||
Subject: Cryptography: history, methods, NSA, government, Echelon
(government sattelite system). |
||||||||||||||||||||||||
|
||||||||||||||||||||||||
I. Introduction | ||||||||||||||||||||||||
Hi! |
||||||||||||||||||||||||
II. The esssay | ||||||||||||||||||||||||
A. Introduction. Secret codes have been the exclusive property of spies and secret services
for centuries. But now, since the comming of the Internet, the art of
secret coding has become a true industry. Cryptographical techniques are
used in the most different applications, going from identification codes
for mobile phones to the protection of electronical money and the e-commerce.
B. Text becomes maths. The automation of the cryptography started in the early twenties. The
first automated decoder, named Colossus, has been used to decode the Lorentz-code
of the Nazi's. After WW I, also the cryptographist started to use an automated
computer to encode his messages, because it was faster and more flexible
then any other electromechanical encoding machine. By addition, the digital
computer didn't work with letters, but with binary numbers. Texts were
converted to 'ones' and 'zeros' and got into the world of maths.
Substitution changes the signs with other signs.
There also has to be a difference between the encryption algo and the key, that gives more precise details about the scheme. Of all existing code systems, only the Vernam-code or 'one time pad'
is absolutely uncrackable: in this code system, the key must be as long
as the original text and must consist of a row random numbers. In addition,
the key can be only used once. C. Belgian code becomes new American standard. A code that can be cracked theoretically, can be uncrackable in practice. Many encryption techniques are so complex, that it would take too much time and too much money to effectively crack it. If an encryption is difficult to crack depends of many factors: - The length of the key: 4 decimal numbers
deliver only 10.000 possibilities (10^4), that can be easily cracked with
a computer by checking all possibilities. Long keys with letters AND numbers,
deliver an astronomical big amount of keys, that way it would be almost
impossible to crack it. Let us take our previous example of 4 places,
but now you can choose between the 10 numbers (0123456789) and the 26
letters of the alphabet, lowercase. That would give (10+26)^4 possibilities
or 1.679.616 different keys. After WW II, computers became more powerful, faster and cheaper. In the 60's, many companies started to use encryption. There was only one problem: there was no standard, everybody used another encoding system. In 1977, the American government decided to use an adapted version of the IBM Lucifer-encoding system. The NSA adapted the program by limiting the length of the key to 56 bits. The NSA believed that 56 bit encryption was safe enough for civil use. The NSA itself had the biggest computer processing power and was able to break the 56 bit encryption. The new standard was called DES (Data Encryption Standard), and is still the encoding standard of America. However, nowadays computers can easily crack a 56 bit DES encryption. Last year, an encode message got decrypted by supercomputer Deep Crack and Distributed.Net, a network of 100.000 on the internet connected computers. It took only 22h and 15 minutes. The two systems together tested 245 billion keys every second! DES' successor is finally finished and acknowledged: AES (Advanced Encryption Standard). It's developed two belgian experts: Vincent Rijmen and Joan Daemen. They call it the Flemish 'Rijndael'-system. (Flanders is a province in Belgium, where I live). This new system is very safe, performant and efficient. A simple comparison with the DES system: if we would have a machine that could crack a 56-bits DES key in one second, then that machine would need about 149.000.000.000.000 years to crack a Rijndael-key of 128 bits. D. More privacy with public keys. With the introduction of DES in the seventies, the problem of standarisation was solved, but there was still another problem: key distribution. This could not be done by telephone or by letter, because this could be intercepted. Therefore, people started to use couriers to exchange the keys. As this system was too long-winded, Diffie and Hellman developed a system based on modular maths.
Now you know how modular math works, it's time to explain the Diffie-Hellman protocol of distributing keys with help of an example: Two persons, Alice and Bob, want to send eachother an encrypted message. The one-way function is: Y^x (mod P). Where Y and P are two public numbers that count for both persons. These numbers can be seen by others. In our example, Y=7 and P=11. These numbers have to apply to certain rules which I will not discuss here. Then Alice chooses a secret private number x for himself. The same does
Bob. This number x must be kept secret, otherwise the message can be decoded. Alice calculates with her private number 3 the one-way function: 7^3(mod
11) = 2 = A Alice sends the result (2) to Bob, and Bob sends his result (4) to Alice. Alice: 4^3(mod 11) = 64 (mod 11) = 9 9 is the keynumber that Alice and Bob can use for coding and decoding. A cryptanalist can't calculate this number because he hasn't got both secret numbers. The secret number x can also not be calculated of the result A, because A is a result of a one-way function. The fact that both numbers are equal, in spite of the different calculations,
can be easily explained with the mingling of colors. Imagine that Alice
and Bob both use the color 'yellow'. They add each a secret other color
to the yellow. Alice takes 'red' as secret color, and Bob 'purple'. When
the colors are mingled, they give the mixture to eachother and add their
secret color to the mixture. Result: This system, of sending eachother numbers, is pretty long-winded for intensive commercial use. Therefore, Diffie and Hellman had the idea (only the idea) of a two key system: a private and public key. The public key is used to encrypt, the private key to decrypt. This system is know as asymmetric keycryptography. E. The 'Pretty Good Privacy' of Zimmerman An actual method for asymmetric keycryptography has been developed in 1977 by Ron Rivest, Adi Shamier and Leonard Adleman, respectively two computerscientists and a mathematician. They also developed the RSA - system (Rivest Shamier Adlemen), which works this way: we have two private prime numbers p and q. Multiplicated, they form the public number N. This number N can be used to encode messages. p and q are used by the receiver to decrypt. Only he can decrypt his message, because there's no mathematical method to dissolve N in his prime factors p and q. When p and q are very large, even a supercomputer can't find p and q giving N=p*q. Philip Zimmerman, computer scientist and political activist, had the
opinion that everyone should be able to use the robust RSA encryption.
So he made his own RSA-related encryption method and distributed it on
a Usenet-bulletinboard, so everyone could download it for free. The PGP program provoked a big discussion about the positive and negative effects of encryption. A debate that's still going on.... . People are argumenting that they need privacy, government is argumenting that encryption can be used by criminals, giving them a powerful weapon. F. Echelon, the 'all-seeing' eye Because governments worldwide saw the consequences encryption could have when criminals would start using it, they limited the strength of encryption, and forbid the export of encryption to other countries. America, England, Canada, Austria and New-Sealand developed a hypersophisticated network of sattelites that are able to intercept every form of electronical communication: phones, mobile phones, fax and e-mail. The system can't pick messages of specific persons, but can intercept masses of messages and conversations. Supercomputers then analyze the content of the intercepted info on keywords like "bomb, Bin Laden, etc...", adresses, names, telephone numbers, etc... . Only relevant messages get selected and analysed. Initially, Echelon was used during the cold war to intercept "hostile" messages from Russia. But later on, after the cold war, Echelon was used for other purposes as there are: economical, scientific and political spying. For fysist and journalist Duncan Campbell, Echelon commits systematically infringement on the privacy of governments, companies and individuals. Because many people, but in particular: companies, are afraid of government
abuse, they are advocates of strong encryption. Governments are afraid
that strong encryption will be used for criminal purposes and are adverseries
of strong encryption for the regular people. |
||||||||||||||||||||||||
|
||||||||||||||||||||||||
From: EOS - December 2000 p. 96 - 102 written by Marc Meuleman in Dutch. Heavily edited and translated by The Blackbird on 18-11-2000. This essay can not be freely distributed/ published/ printed, etc... , without permission of EOS. |