By Henry Corrigan-Gibbs Illustrations by Brian Stauffer

Total Page:16

File Type:pdf, Size:1020Kb

By Henry Corrigan-Gibbs Illustrations by Brian Stauffer BY HENRY CORRIGAN-GIBBS ILLUSTRATIONS BY BRIAN STAUFFER 58 NOVEMBER/DECEMBER 2014 Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today. STANFORD 59 federal laws prohibiting arms trafficking, communication of atomic secrets and disclosure of classified information. Without naming Hellman or his co- authors, Meyer specified the issues of IEEE’s Transactions on Information your research could help solve a looming national problem, but Theory journal and Computer magazine government officials thought publishing it would be tantamount in which Hellman’s articles appeared. to treason? A Stanford professor and his graduate students found Meyer concluded ominously that “these themselves in that situation 37 years ago, when their visionary work modern weapons technologies, uncon- trollably disseminated, could have more on computer privacy issues ran afoul of the National Security Agen- than academic effect.” cy. At the time, knowledge of how to encrypt and decrypt informa- Meyer’s letter alarmed many in the tion was the domain of government; the NSA feared that making the academic community and drew coverage secrets of cryptography public would severely hamper intelligence by Science and the New York Times for operations. But as the researchers saw it, society’s growing depen- two main reasons. First, the letter sug- gested that merely publishing a scientific dence on computers meant that the private sector would also need paper on cryptography would be the legal effective measures to safeguard information. Both sides’ concerns equivalent of exporting nuclear weapons proved prescient; their conflict foreshadowed what would become a to a foreign country. If Meyer’s interpre- universal tug-of-war between privacy-conscious technologists and tation of the law was correct, it seemed security-conscious government officials. to place severe restrictions on research- ers’ freedom to publish. Second, Debo- ment’s longstanding domestic monopoly rah Shapley and Gina Kolata of Science A CONTROVERSIAL on cryptography deeply annoyed many magazine discovered that Meyer was an SYMPOSIUM in the intelligence community. The NSA NSA employee. The International Symposium on Infor- acknowledged that Diffie and Hellman As soon as Hellman received a copy of mation Theory is not known for its racy had come up with their ideas without the letter, he recognized that continuing content or politically charged presenta- access to classified materials. Even so, to publish might put him and his stu- tions, but the session at Cornell Univer- in the words of an internal NSA history dents in legal jeopardy, so he sought sity on October 10, 1977, was a special declassified in 2009 and now held in the advice from Stanford University counsel case. In addition to talks with titles like Stanford Archives, “NSA regarded the John Schwartz. “Distribution-Free Inequalities for the [Diffie-Hellman] technique as classified. In his memo to Schwartz, Hellman Deleted and Holdout Error Estimates,” Now it was out in the open.” made a lucid case for the value of public- the conference featured the work of a The tension between Hellman and the domain cryptography research. Astutely, group from Stanford that had drawn the NSA only worsened in the months lead- Hellman first acknowledged that the U.S. ire of the National Security Agency and ing up to the 1977 symposium. In July, government’s tight control over crypto- the attention of the national press. The someone named J. A. Meyer sent a shrill graphic techniques proved enormously researchers in question were Martin letter to the Institute of Electrical and useful in World War II: Allied forces used Hellman, then an associate professor of Electronics Engineers, which had pub- confidential cryptographic discoveries to electrical engineering, and his students lished Hellman’s papers and was holding improve their own encryption systems Steve Pohlig, MS ’75, PhD ’78, and Ralph the conference. It began: while denying those same cryptographic Merkle, PhD ’79. benefits to Axis powers. Even so, Hellman A year earlier, Hellman had published I have noticed in the past months argued that circumstances had changed. “New Directions in Cryptography” with that various IEEE Groups have his student Whitfield Diffie, Gr. ’78. The been publishing and exporting [T]here is a commercial need paper introduced the principles that now technical articles on encryption today that did not exist in the 1940’s. form the basis for all modern cryptogra- and cryptology—a technical field The growing use of automated infor- phy, and its publication rightfully caused a which is covered by Federal Regu- mation processing equipment poses stir among electrical engineers and com- lations, viz: ITAR (International a real economic and privacy threat. puter scientists. As Hellman recalled in a Traffic in Arms Regulations, 22 Although it is a remote possibility, 2004 oral history, the nonmilitary com- CFR 121-128). the danger of initially inadver- munity’s reaction to the paper was “ecstat- tent police state type surveillance ic.” In contrast, the “NSA was apoplectic.” Meyer’s letter asserted that the IEEE through computerization must be The fact that Hellman and his stu- and the authors of the relevant papers considered. From that point of view, dents were challenging the U.S. govern- might be subject to prosecution under inadequate commercial cryptogra- 60 NOVEMBER/DECEMBER 2014 phy (which our publications are tographic algorithms could constitute decision up to the students. trying to avoid) poses an internal “export” of arms. It was not clear, how- According to Hellman, Merkle and national security threat. ever, that a prosecution under this act Pohlig at first said, “We need to give the would stand up to a legal challenge on papers, the hell with this.” After speak- In the memo, Hellman described how First Amendment grounds. ing with their families, though, the stu- his earlier attempts to prevent “stepping Evaluating these laws together, dents agreed to let Hellman present on on [the] toes” of the NSA failed when the Schwartz concluded that Hellman and his their behalf. agency’s staffers would not even disclose students could legally continue to pub- In the end, the symposium took place which areas of cryptography research lish. At the same time, Schwartz noted without incident. Merkle and Pohlig stood Hellman should avoid. wryly, “at least one contrary view [of the on stage while Hellman gave the presen- Responding to Hellman a few days law] exists”—that of Joseph A. Meyer. tation. The fact that the conference went later, Schwartz opined that publishing Hellman later recalled Schwartz’s less- ahead as planned, Science observed, “left cryptography research would not in itself than-comforting informal advice: “If you little doubt that the work [in cryptogra- violate federal law. His findings had a are prosecuted, Stanford will defend you. phy] has been widely circulated.” That a strong legal basis: Two regulations gov- But if you’re found guilty, we can’t pay group of nongovernmental researchers erned classified information in the United your fine and we can’t go to jail for you.” could publicly discuss cutting-edge cryp- States at the time—an executive order and The Cornell symposium was to begin tographic algorithms signaled the end of the Atomic Energy Act of 1954—and nei- three days after Schwartz offered his legal the U.S. government’s domestic control ther seemed to prevent the publication of opinion; Hellman, Merkle and Pohlig had of information on cryptography. unclassified research on cryptography. to quickly decide whether to proceed There was only one other likely legal with their presentations in spite of the tool that the federal government could threat of prosecution, fines and jail time. THE VIEW FROM use to prevent the Stanford group from Graduate students typically present their FORT MEADE disseminating their work: the Arms own research at academic conferences, Vice Adm. Bobby Ray Inman took over as Export Control Act of 1976, which regu- but according to Hellman, Schwartz rec- director of the NSA in the summer of lated the export of military equipment. ommended against it in this case. Since 1977. Inman was an experienced naval Under a generous interpretation of the the students were not employees of Stan- intelligence officer with allies in both law, giving a public presentation on cryp- ford, it might be more difficult for the political parties. If his qualifications for university to justify paying their legal the job were good, his timing was not. He bills. Schwartz also reasoned that dealing had barely warmed his desk chair when SHARING THE STEALTH: Merkle, Hellman and Diffie with a lengthy court case would be harder he was thrust into the center of what he ended government’s for a young PhD student than for a ten- recently described as “a huge media monopoly on cryptography. ured faculty member. Hellman left the uproar” over the J. A. Meyer letter—written the very first day of Inman’s tenure. Although Inman was concerned about the impact that publication of these new cryptographic techniques would have on the NSA’s foreign eavesdropping capabilities, he was also puzzled. As he explained, the primary consumers of cryptographic equipment in the 1970s were governments. Apart from that, “the only other people early on . who were buying encryption to use were the drug dealers.” Since the NSA already had “incredibly able people working on build- ing the systems to be used by the U.S. gov- ernment” and the NSA had no interest in protecting the communications of drug dealers, Inman wanted to find out why these young researchers were so focused on cryptography. In the tradition of intelligence profes- sionals, Inman set out to gather some information for himself. He went to Cali- CHUCK PAINTER/STANFORD NEWS SERVICE SERVICE NEWS CHUCK PAINTER/STANFORD fornia to meet with faculty members and STANFORD 61 industry leaders at Berkeley, Stanford and as a crucial piece of a functioning techno- To reckon with the growing threat of elsewhere.
Recommended publications
  • The Moorer Commission
    The Moorer Commission 1 Findings of the Independent Commission of Inquiry into the Israeli Attack on USS Liberty, the Recall of Military Rescue Support Aircraft while the Ship was Under Attack, and the Subsequent Cover - up by the United States Government October 22, 2003 Admiral Thomas H. Moorer, U.S. Navy (deceased) Former Chairman, Joint Chiefs of Staff General Raymond G. Davis, U.S. Marine Corps (deceased) (MOH)*, Former Assistant Commandant of the Marine Corps Rear Admiral Merlin Staring, U.S. Navy (deceased) Former Judge Advocate of the Navy (73 - 75) Ambassador James Akins (deceased) Former U.S. Ambassador to Saudi Arabia (73 - 76) We, the undersigned having undertaken an independent investigation of Israel’s attack on USS Liberty , including eyewit ness testimony from surviving crewmembers, a review of naval and other official records, an examination of official statements by the Israeli and American governments, a study of the conclusions of all previous official inquiries, and a consideration of im portant new evidence and recent statements from individuals having direct knowledge of the attack or the cover up, hereby find the following:** 1. That on June 8, 1967, after eight hours of aerial surveillance, Israel launched a two - hour air and naval attack against USS Liberty, the world’s most sophisticated intelligence ship, inflicting 34 dead, and 173 wounded American servicemen (a casualty rate of 70%, in a crew of 294).; 2 2. That the Israeli air attack lasted approximately 25 minutes, during which time un marked Israeli aircraft dropped napalm canisters on USS Liberty’s bridge, and fired 30mm cannons and rockets into our ship, causing 821 holes, more than 100 of which were rocket - size; survivors estimate 30 or more sorties were flown over the ship by minimu m of 12 attacking Israeli planes which were jamming all 5 American emergency radio channels; 3.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • In the Shadow of General Marshall-Old Soldiers in The
    In The Shadow of General Marshall: Old Soldiers in the Executive Branch Ryan Edward Guiberson Anaconda, Montana Bachelor of Science, United States Air Force Academy, 1992 Master of Arts-Political Science, University of Florida, 1994 A Dissertation presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Doctor of Philosophy Department of Politics University of Virginia August, 2013 2 Abstract: The usurpation of political authority by tyrannical military figures is a theme that pervades the history of politics. The United States has avoided such an occurrence and the prospect of a military coup d’etat rarely registers as a realistic concern in American politics. Despite the unlikelihood of this classic form of military usurpation, other more insidious forms lurk and must be guarded against to protect civilian control of the military. One potential manifestation has been referred to as a military colonization of the executive branch. This form implies that retired senior military officers increasingly pursue executive branch positions and unduly promote the interests of the active duty military, its leaders, and military solutions to national security issues. This work addresses military colonization claims by examining the number of retired senior military officers that have served in executive branch positions, trends in where they participate, and their political behavior in these positions. It also uses interviews with retired senior military officers to gain their perspectives on the incentives and disincentives of executive branch service. The study concludes that in the post-Cold War period, participation rates of retired senior military officers in key executive branch positions do not diverge significantly from broader post-World War II patterns.
    [Show full text]
  • The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories
    The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through the company that Ronald Rivest, Adi Shamir and Leonard Adleman started in 1982 to commercialize the RSA encryption algorithm that they had invented. At the time, Kaliski had just started his undergraduate degree at MIT. Professor Rivest was the advisor of his bachelor’s, master’s and doctoral theses, all of which were about cryptography. When Kaliski finished his graduate work, Rivest asked him to consider joining the company, then called RSA Data Security. In 1989, he became employed as the company’s first full-time scientist. He is currently chief scientist at RSA Laboratories and vice president of research for RSA Security. Introduction Number theory may be one of the “purest” branches of mathematics, but it has turned out to be one of the most useful when it comes to computer security. For instance, number theory helps to protect sensitive data such as credit card numbers when you shop online. This is the result of some remarkable mathematics research from the 1970s that is now being applied worldwide. Sensitive data exchanged between a user and a Web site needs to be encrypted to prevent it from being disclosed to or modified by unauthorized parties. The encryption must be done in such a way that decryption is only possible with knowledge of a secret decryption key. The decryption key should only be known by authorized parties. In traditional cryptography, such as was available prior to the 1970s, the encryption and decryption operations are performed with the same key.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay
    A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay It was my first trip to the US. It had not yet sunk in that I had been chosen by ACM India as one of two Ph.D. students from India to attend the big ACM Turing Centenary Celebration in San Francisco until I saw the familiar face of Stephen Cook enter a room in the hotel a short distance from mine; later, Moshe Vardi recognized me from his trip to IITB during FSTTCS, 2011. I recognized Nitin Saurabh from IMSc Chennai, the other student chosen by ACM-India; 11 ACM SIG©s had sponsored students and there were about 75 from all over the world. Registration started at 8am on 15th June, along with breakfast. Collecting my ©Student Scholar© badge and stuffing in some food, I entered a large hall with several hundred seats, a brightly lit podium with a large screen in the middle flanked by two others. The program began with a video giving a brief biography of Alan Turing from his boyhood to the dynamic young man who was to change the world forever. There were inaugural speeches by John White, CEO of ACM, and Vint Cerf, the 2004 Turing Award winner and incoming ACM President. The MC for the event, Paul Saffo, took over and the panel discussions and speeches commenced. A live Twitter feed made it possible for people in the audience and elsewhere to post questions/comments which were actually taken up in the discussions. Of the many sessions that took place in the next two days, I will describe three that I found most interesting.
    [Show full text]
  • Dr. Adi Shamir
    using the encryption key, allowing anyone to verify the signatory as “Electronics, Information and Communication” field the one with the decryption key. Achievement : Contribution to information security through pioneering research on cryptography The invention of the secret sharing scheme which Dr. Adi Shamir (Israel) protects information from disasters Born: July 6, 1952 (Age: 64, Nationality: Israel) Professor, Weizmann Institute of Science Information dispersal is crucial for the secure storage of important data. In 1979, Dr. Shamir was the first to propose the “secret sharing Summary scheme,” which specifies the dispersal method that ensures the security The advent of open digital networks, namely the Internet, has enabled of information depending on the extent of dispersed information us to lead a convenient lifestyle like never before. Such comfort has leakage. This was achieved using the polynomial method. been made possible thanks to security measures preventing the theft and Based on the fact that a straight line is a first degree polynomial, and a parabola manipulation of valuable information. It is Dr. Adi Shamir who proposed is a second degree polynomial, secret information is represented as points on the many of the underlying concepts in information security and developed polynomial. Points other than the secret information are dispersed and stored. By a series of practical solutions. doing so, a first degree polynomial requires two pieces of dispersed information, Information in digital networks is coded in binary digits. Utilizing and that of the second degree requires three pieces of dispersed information to mathematical methodology, Dr. Shamir has invented and proposed recover the secret information.
    [Show full text]
  • Alan Mathison Turing and the Turing Award Winners
    Alan Turing and the Turing Award Winners A Short Journey Through the History of Computer TítuloScience do capítulo Luis Lamb, 22 June 2012 Slides by Luis C. Lamb Alan Mathison Turing A.M. Turing, 1951 Turing by Stephen Kettle, 2007 by Slides by Luis C. Lamb Assumptions • I assume knowlege of Computing as a Science. • I shall not talk about computing before Turing: Leibniz, Babbage, Boole, Gödel... • I shall not detail theorems or algorithms. • I shall apologize for omissions at the end of this presentation. • Comprehensive information about Turing can be found at http://www.mathcomp.leeds.ac.uk/turing2012/ • The full version of this talk is available upon request. Slides by Luis C. Lamb Alan Mathison Turing § Born 23 June 1912: 2 Warrington Crescent, Maida Vale, London W9 Google maps Slides by Luis C. Lamb Alan Mathison Turing: short biography • 1922: Attends Hazlehurst Preparatory School • ’26: Sherborne School Dorset • ’31: King’s College Cambridge, Maths (graduates in ‘34). • ’35: Elected to Fellowship of King’s College Cambridge • ’36: Publishes “On Computable Numbers, with an Application to the Entscheindungsproblem”, Journal of the London Math. Soc. • ’38: PhD Princeton (viva on 21 June) : “Systems of Logic Based on Ordinals”, supervised by Alonzo Church. • Letter to Philipp Hall: “I hope Hitler will not have invaded England before I come back.” • ’39 Joins Bletchley Park: designs the “Bombe”. • ’40: First Bombes are fully operational • ’41: Breaks the German Naval Enigma. • ’42-44: Several contibutions to war effort on codebreaking; secure speech devices; computing. • ’45: Automatic Computing Engine (ACE) Computer. Slides by Luis C.
    [Show full text]
  • Contents 1 a Brief Introduction to Cryptography
    RSA Catherine Easton July 2007 VIGRE REU at the University of Chicago, Apprentice Program Abstract This paper examines the mathematics of the RSA code through a simple example. Contents 1 A Brief Introduction to Cryptography 1 2 RSA 2 2.1 Keys needed in RSA . 2 2.2 RSA Encryption . 2 2.3 RSA decryption . 4 1 A Brief Introduction to Cryptography In the classical explanation of cryptography, Alice wishes to write a message to Bob, but Eve continues to intercept her messages. Alice and Bob decide to encrypt their messages. Alice and Bob can meet in person and exchange a key. With this informa- tion, they can both encrypt and decrypt messages to each other. Even if Eve manages to intercept a message, she will not be able to gain any information from it, seeing as it is encoded and she does not know the key necessary for decryption. This scenario uses private-key cryptography. Now, however, let us assume that it is impossible for Alice and Bob to meet, and that they are therefore unable to exchange the key. Obviously, Alice cannot send Bob the key, seeing as their messages are being intercepted by Eve, who would then know the key as well. To overcome this barrier, Alice and Bob must use public-key cryptography. Bob selects both an encryption function and a cor- responding decryption function. He sends only the encryption function to Alice. 1 She then uses the encryption function to encrypt her message. Once her message is encrypted, Alice herself is unable to decrypt it.
    [Show full text]
  • Looking for Computers in the Biological Cell. After Twenty Years⋆
    Looking for Computers in the Biological Cell. After Twenty Years? Gheorghe P˘aun Institute of Mathematics of the Romanian Academy PO Box 1-764, 014700 Bucure¸sti,Romania [email protected] 1 Preliminary Cautious and Explanations The previous title needs some explanations which I would like to bring from the very beginning. On the one hand, it promises too much, at least with respect to my scientific preoccupations in the last two decades and with respect to the discussion which follows. It is true that there are attempts to use the cell as it is (bacteria, for instance) or parts of it (especially DNA molecules) to compute, but a research direction which looks more realistic, at least for a while, and which has interested me, is to look in the cell for ideas useful to computer science, for computability models which, passing from biological structures and processes to mathematical models, of a computational type, can not only ensure a better use of the existing computers, the electronic ones, but they can also return to the starting point, as tools for biological investigations. Looking to the cell through the mathematician-computer scientist glasses, this is the short description of the present approach, and in this area it is placed the personal research experience which the present text is based on. On the other hand, the title announces already the autobiographical intention. Because a Reception Speech is a synthesis moment, if not also a career summarizing moment, it cannot be less autobiographical than it is, one uses to say, any novel or poetry volume.
    [Show full text]