Post-Snowden Cryptography Or Who Holds Your Keys? Crypto Wars
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
REPORTER "Eluding Electronic Servicing
MAY, 1963 35 CENTS REPORTER "eluding Electronic Servicing Special Equipment Speeds Servicing A...,-`" _.. .., . _ . --:._ Molecular Electronics Explained Resistors With More Than One Job } www.americanradiohistory.com BIG -SYSTEM MUSCLE... _ . u . , . ... : .: : . .- . : . a .,...: .. e : : . ... a . + _.. a ! a . e s s . ! . 1 . ! . e i . 1 . s e e . / . a ' / 11 . / . / s f ! . e . ! ! e s . > . te...... cc..... / a e a a . 1 w . a f i . : / ! . / / . .. - / / . ! ! ! / . .. ....... ................... 18Í . e . .. t a a e + e1V . 7J / Ma/ i Qç } ; , ! a- ir '+4 . +. & ! ,. e ! ' "' ac. 4 .:.a a . SMALL -SYSTEM PRICE! NEW JERROLD TV DISTRIBUTION SYSTEM ENGINEERED FOR THE NEW COLOR -TV ERA Designed for TV shops, dealers' showrooms, The JERROLD "Challenger" Amplifier, small apartments and motels Model ACL-200, delivers 20db minimum gain Feeds up to 32 TV and FM sets over the low band, 19db No controls or adjustments over the high band. New "Quick -Disconnect" plug-in outlets Flat response-unique in a low-price amplifier, but necessary for good color TV. Easy to install, Here's the distribution system to sell to TV and no controls to adjust. Famous JERROLD qual- FM dealers for their color -TV showrooms .. ity is built in to stay. perfect too for the small apartment building or Model ACL-200, $38.97 net motel that's been needing an antenna system See your JERROLD distributor or write but couldn't afford one before. It's also ideal for Jerrold Electronics, Distributor Sales Division, your own service shop. Philadelphia 32, Pa. icz:=;`1 JER RO LO New crown -washer screw Exclusive "Gamma" ELECTRONICS New 4- and 8 -way nigh - terminals for stripped or chassis fittings for quick isolation networks. -
NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC. -
A Matter of Security, Privacy and Trust
A matter of security, privacy and trust: A study of the principles and values of encryption in New Zealand Michael Dizon Ryan Ko Wayne Rumbles Patricia Gonzalez Philip McHugh Anthony Meehan Acknowledgements This study was funded by grants from the New Zealand Law Foundation and the University of Waikato. We would like to express our gratitude to our project collaborators and members of the Advisory Board – Prof Bert-Jaap Koops (Tilburg University), Prof Lyria Bennett Moses (UNSW Sydney), Prof Alana Maurushat (Western Sydney University), and Associate Professor Alex Sims (University of Auckland) – for their support as well as feedback on specific parts of this report. We would also like to thank Patricia Gonzalez, Joseph Graddy, Philip McHugh, Anthony Meehan, Jean Murray and Peter Upson for their valuable research assistance and other contributions to this study. Michael Dizon, Ryan Ko and Wayne Rumbles Principal investigators December 2019 Executive summary Cybersecurity is crucial for ensuring the safety and well-being of the general public, businesses, government, and the country as a whole. New Zealand has a reasonably comprehensive and well-grounded legal regime and strategy for dealing with cybersecurity matters. However, there is one area that deserves further attention and discussion – encryption. Encryption is at the heart of and underpins many of the technologies and technical processes used for computer and network security, but current laws and policies do not expressly cover this significant technology. The principal objective of this study is to identify the principles and values of encryption in New Zealand with a view to informing future developments of encryption- related laws and policies. -
State of the Art in Lightweight Symmetric Cryptography
State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing. -
NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament. -
Dispatch from the Crypto Wars, A
A Dispatch From the Crypto Wars A. MICHAEL FROOMKIN Reviewing MATT CURTIN, BRUTE FORCE: CRACKING THE DATA ENCRYPTION STANDARD (2005). ABSTRACT Matt Curtin'sBrute Force is a primarily personal account of one early effort to harness the power of distributed computing. In 1997, Mr. Curtin and other members of the DESCHALL (DES Challenge) project built, distributed, and managed software that united thousands of computers, many of them ordinary personal computers, in the search for a single decryption key among 72 quadrillion possibilities. The DESCHALL project sought to demonstrate that DES, then the U.S. national standardencryption algorithm, was no longer as secure as advertised. While Brute Force also offers some background on encryption regulation, export control policy, and other aspect of the Crypto Wars, it succeeds best as an almost diaristicaccount of the technical and organizationalchallenges at the heart of one of the earliest large- scale widely dispersed volunteer computing projects. The DES cracking project chronicled in Brute Force exemplifies the interplay between technology and politics. More importantly, Brute Force reminds us that although we survived one round of the Crypto Wars without actual controls on the use of cryptography, and indeed with some substantial relaxation of the export control regime that stood in the way of the routine adoption of strong crypto in many types of software, that result was not inevitable - and might again come under threat. Matt Curtin's Brute Force: Cracking the Data Encryption Standard (Brute Force)' is a personal account of a battle in the first round of the Crypto Wars. It provides the fullest account in print of the cracking of a DES message in 1997 by the DESCHALL (DES Challenge) project. -
Federal Communications Commission FOIA Request Log, July 2015
Federal Communications Commission FOIA request log, July 2015 - June 2016 Brought to you by AltGov2 www.altgov2.org/FOIALand Tracking Number Requester Organization Submitted Due Closed Date Status Dispositions Detail We are writing in relation to Nobel Financial Ltd. ("the Company"), a company which is in the process of being licensed as an electronic money institution in terms of the Financial Institutions Act. The MFSA has been informed that Mr. Micaiah Drew Poleate will be appointed as Executive Vice President and Senior Manager of the Company. We undestand that Mr. Poleate may be known to the US Federal Communications Commission ("FCC") in view of his past involvement as Financial Analyst of Nobel Limited Company LLC, during the period February 2002 to December 2006, which we understand is a company regulated by the FCC. In this regard, we would appreciate if you could kindly confirm whether: a) our understanding is correct; b) Mr. Poleate is currently held in good-standing by the FCC; c) there have been any complaints against Mr. Poleate in connection with which the FCC has or will be taking action; and d) Mr. Poleate has ever FCC-2015-000595 Malta Financial Services Authority 06/30/2015 07/29/2015 07/20/2015 Closed No records been subjected to any censure or criticism and/or disciplinary proceeding by the FCC. FCC-2015-000596 06/30/2015 08/12/2015 08/03/2015 Closed Partial grant/partial denial PLEASE SUPPLY ANY AND ALL RECORDS INVOLVING KG5IDD AND FILE NUMBER 0006853120 FCC-2015-000597 06/30/2015 08/12/2015 08/03/2015 Closed Partial grant/partial denial ANY AND ALL RECORDS ON WD5GXH • A copy of information exchanged between the office of the president or his national security staff and the NTIA regarding preparations for the 2012 World Conference on International Telecommunications (WCIT) negotiations, negotiating stance, the desired outcome of the negotiations, proposals , reservations, and/or concerns about the WCIT process. -
ENCRYPTION SERVED THREE WAYS: DISRUPTIVENESS AS the KEY to EXCEPTIONAL ACCESS Dustin Taylor Vandenberg†
VANDERBERG_INITIALFORMAT_10-01-17 (DO NOT DELETE) 12/4/2017 1:52 PM ENCRYPTION SERVED THREE WAYS: DISRUPTIVENESS AS THE KEY TO EXCEPTIONAL ACCESS Dustin Taylor Vandenberg† Recently, there has been a rapid increase in the deployment of encryption technologies.1 While the ubiquity of encryption has led to innovations in security and privacy,2 these benefits stand at odds with government interests in access to data.3 Controversial court cases in San Bernardino4 and New York5 highlight the modern debate over exceptional access to encrypted data. However, the debate over encryption is not new. The debate began back in the 90s in what has been dubbed the “crypto DOI: https://dx.doi.org/10.15779/Z38GT5FF7R © 2017 Dustin Vandenberg. † J.D. Candidate, 2018, University of California, Berkeley, School of Law. 1. See Susan W. Brenner, Intellectual Property Law Symposium: Encryption, Smart Phones, and the Fifth Amendment, 33 WHITTIER L. REV. 525, 533 (2012) (“I believe we will see an increased use of encryption and other data-protection measures that will make it increasingly difficult, if not impossible, for officers to access the contents of a smart phone or other digital device by bypassing minimal, if any, security measures.”); see also, e.g., Craig Timberg, Newest Androids Will Join iPhones in Offering Default Encryption, Blocking Police, WASH. POST BLOG (Sept. 18, 2014) (“The next generation of Google Android’s operating system . will encrypt data by default.”) https://www.washingtonpost.com/news/the-switch/wp/2014/09/18/newest-androids-will- join-iphones-in-offering-default-encryption-blocking-police/?utm_term=.0800c87af627 [https://perma.cc/S7ZS-J9XP]. -
Unlocking Encryption: Information Security and the Rule of Law
Unlocking Encryption: Information Security and the Rule of Law BY DANIEL CASTRO AND ALAN MCQUINN | MARCH 2016 Advancements in the field of information security, particularly in how to Advances in use encryption to protect the confidentiality of information, have vastly information security could lead to tradeoffs improved security for consumers and businesses. But as products and in the effectiveness of services have become more secure, it has become harder for law law enforcement, but enforcement and national security agencies to access some information limiting encryption will that could help them prevent and investigate crimes and terrorism.1 This certainly make the has created one of the most difficult policy dilemmas of the digital age, as average consumer and business less secure. encryption both improves security for consumers and businesses and makes it harder for governments to protect them from other threats. There is no way to square this circle, so any choice will come with tradeoffs. However, ITIF believes that the U.S. government should not restrict or weaken encryption, because any attempts to do so would reduce the overall security of law-abiding citizens and businesses, make it more difficult for U.S. companies to compete in global markets, and limit advancements in information security. Moreover, attempts to restrict or weaken encryption would be ineffective at keeping this technology out of the hands of many criminals and terrorists. Cybersecurity is often portrayed as a never-ending arms race pitting those who wish to secure their computers and networks against attackers intent on breaking into their INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | MARCH 2016 PAGE 1 systems. -
Reframing the Crypto Wars
CONTENTS Introduction 1 A Highlights Reel of the U.S. Encryption Debate 2 The Early “Crypto Wars” and the Clipper Chip 2 The Encryption Debate Sequel: Snowden and Surveillance 3 Privacy and the Encryption Debate 3 Earn It: Encryption Controversy Over Section 230 3 The Current International Debate Around Encryption 4 The Impact of International Encryption Policy on Domestic Policy 5 Security Versus Privacy or Security Versus Security 5 Challenges to Making Progress on the Encryption Debate 6 The Increased Availability of User-friendly Encryption Services 6 A Lack of a Common Language 6 A Lack of a Whole of Government Approach to Cybersecurity 7 Disagreement About Backdoor Alternatives 8 Conclusion 9 About the Authors 10 R STREET POLICY STUDY NO. 237 The debate was seemingly set to be answered by the courts in July 2021 2016, when Apple refused to craft new software at the behest of the Federal Bureau of Investigation (FBI) that would allow the agency to access encrypted information on a phone belonging to one of the shooters in a 2015 terrorist attack on Inland Regional Center in San Bernardino, California. REFRAMING THE CRYPTO WARS But the “going dark” encryption debate shares a key charac- By Kathryn Waldron and Sofia Lesmes teristic with the walking dead: no matter how many times you try to put it to rest, it keeps coming back. In October 2020, the Department of Justice (DOJ) issued an international INTRODUCTION statement calling for companies to “[e]nable law enforce- ment access to content in a readable and usable format where or the past several decades, policymakers, law enforce- authorisation is lawfully issued, is necessary and proportion- ment, private companies, civil liberties advocates and ate, and is subject to strong safeguards and oversight.”2 Both cybersecurity specialists have been locked in a pas- at home and abroad, there are increased government calls to sionate yet seemingly unending battle over encryp- weaken encryption in the name of national security. -
Encryption and the “Going Dark” Debate
Encryption and the “Going Dark” Debate Updated January 25, 2017 Congressional Research Service https://crsreports.congress.gov R44481 Encryption and the “Going Dark” Debate Summary Changing technology presents opportunities and challenges for U.S. law enforcement. Some technological advances have arguably opened a treasure trove of information for investigators and analysts; others have presented unique hurdles. While some feel that law enforcement now has more information available to them than ever before, others contend that law enforcement is “going dark” as their investigative capabilities are outpaced by the speed of technological change. These hurdles for law enforcement include strong, end-to-end (or what law enforcement has sometimes called “warrant-proof”) encryption; provider limits on data retention; bounds on companies’ technological capabilities to provide specific data points to law enforcement; tools facilitating anonymity online; and a landscape of mixed wireless, cellular, and other networks through which individuals and information are constantly passing. As such, law enforcement cannot access certain information they otherwise may be authorized to obtain. Much of the current debate surrounds how strong encryption contributes to the going dark issue, and thus it is the focus of this report. The tension between law enforcement capabilities and technological change has received congressional attention for several decades. For instance, in the 1990s the “crypto wars” pitted the government against technology companies, and this tension was highlighted by proposals to build in back doors to certain encrypted communications devices as well as to restrict the export of strong encryption code. In addition, Congress passed the Communications Assistance for Law Enforcement Act (CALEA; P.L. -
ACF Nationals 2016 Packet by Georgia Tech (Adam Silverman) Tossups
ACF Nationals 2016 Packet by Georgia Tech (Adam Silverman) Tossups 1. A 2008 paper by Haynes et al. described implementing a computer made of E. coli to solve a variant of this problem. In 1995, Manuel Blum solved a variant of this problem for n inputs with “23n over 14 plus c” operations, where c is a constant. The first algorithm to solve this problem non-trivially showed that when n is greater than 10, a runtime of 5/3 n could be achieved. This problem can be solved trivially using “2n minus 3” operations, since anyone can find the largest item, move it to the top and move it to the bottom in two operations. Futurama co-creator David X. Cohen’s most cited paper and Bill Gates’s only academic paper both focused on this problem, whose “burnt” variant requires one extra “flip” to solve in the naive solution. For 10 points, name this computer science problem which is often visualized as a sorting problem in which a spatula is used to rearrange the namesake items. ANSWER: pancake sorting [accept anything indicating this is the (burnt) pancake problem; accept prefix reversal; prompt on sorting problem] 2. The Sabayel Castle in this city fell into the sea in the 14th century. Ludwig and Robert Nobel, Alfred's brothers, made their fortunes in the Branobel company while living in its “Black City.” Fath Ali Khan died in this city after uniting its khanate with the Quba khanate. Adolf Hitler symbolically chose a piece of dark chocolate cake representing this city for his birthday in 1941.