Transcript
Page 1: The History of Secrets Cryptography and Privacy

The History of SecretsCryptography and Privacy

Patrick JuolaDuquesne University

Department of Mathematics and Computer Science

Page 2: The History of Secrets Cryptography and Privacy

Secret Writings

• Used to write to authorized people• Good guys :

• Business partners, lovers, fellow soldiers• Bad guys :

• Competitors, parents, enemies, foreign agents• Secrets can be military, diplomatic,

commercial, personal, et cetera.

Page 3: The History of Secrets Cryptography and Privacy

An Early Example

• Write in foreign alphabet

• Works surprisingly well in era of mostly illiterate people

attack at dawn

Page 4: The History of Secrets Cryptography and Privacy

Caesar cypher (40 BCE)

YGYKNNCVVCEMQPVJGYGUVUKFGQHVJGECORCVFCYPUVQRRNGCUGDGTGCFAVQUQTVKGVQQWTCUUKUVCPEGLECGUCT

CVVC -- “bATTAlion”? “inDEED”? “ATTAck”? “cigarETTE”/ “bESSEmer converter”?CUUKU -- “pOSSESsion”? “ASSIStance”?

C -> A U -> S K -> I

Page 5: The History of Secrets Cryptography and Privacy

Caesar cypher (cont.)

WEWILLATTACKONTHEWESTSIDEOFTHECAMPATDAWNSTOPPLEASEBEREADYTOSORTIETOOURASSISTANCEJCAESAR

• Caesar and his reader know something the enemy doesn’t

• Can be as simple as replacing letters• Termed the “key” to a cypher• Easier to solve with key than without• Ratio of without/with defines “work factor”

Page 6: The History of Secrets Cryptography and Privacy

Nomenclators (1500 ACE)

• Systematic replacement of one letter by a single other symbol : monoalphabet cypher

• Nomenclator : monoalphabetic cypher with codebook extension for specific words

• Weakness : every appearance of a given letter is encyphered identically

Page 7: The History of Secrets Cryptography and Privacy

Polyalphabetics (16th-20th c.)

• Use multiple alphabets to disguise frequent letters• Playfair cypher -- encrypt letters in groups, so

TA and TE may have nothing in common• Vigenere cypher -- vary Caesar “key” during

encryption• Considered “le chiffre indechiffrable” until early

20th century

Page 8: The History of Secrets Cryptography and Privacy

Vigenere example

• AT becomes both NH and SX in cyphertext• O in cyphertext corresponds to both A, W• Simple frequency analysis no longer works

ATTACKATDAWNNOSENOSENOSENHLEPYSXQOOR

Page 9: The History of Secrets Cryptography and Privacy

Vigenere decryption

• Weakness : key letters repeat• If the key is 4 characters long

• 1st, 5th, 9th, etc. characters use same key letter• 2nd, 6th, 10th, 14th, etc. likewise• Frequency characteristic of monoalphabetic

(Caesar) cypher• Crack four different Caesar cyphers, and

you’re in!

Page 10: The History of Secrets Cryptography and Privacy

What if the key doesn’t repeat?

• A re-used key can give the same effect• BUT

• If the key is sufficiently random• Only used once• And never repeats

• The resulting cypher is called the Vernam cypher (1917) and is provably unbreakable.

• Sometimes called One-Time Pad

Page 11: The History of Secrets Cryptography and Privacy

Who kept the secrets?

• Development and use of cryptography to this point mostly military and diplomatic.

• “Obviously” required substantial talent to do, beyond what most people had

• Civilian cryptography -- secret notes to lovers, business codes -- still used monoalphabetic cyphers

• Methods of analysis becoming available in literature (The Gold Bug, The Dancing Men)

Page 12: The History of Secrets Cryptography and Privacy

What’s a good cypher?

• Kirchoff’s criteria (1883)• Security should reside in the key• System doesn’t need to be kept secret• System should be easy to use in the field• Keys/apparatus should be easily changeable

• Impossible to meet all in practice• Naval ships (submarines) can carry much more

equipment than PFC Ryan

Page 13: The History of Secrets Cryptography and Privacy

Enigma

• Machine cryptography developed in early 20th century; requires bulky apparatus, but far too complex to crack by hand

• ENIGMA -- Main code system of Nazi’s• Three (later four) rotating wheels like

odometer of car. Each wheel position yields different key.

• 159,000,000,000.000,000,000 keys

Page 14: The History of Secrets Cryptography and Privacy

The Computer Revolution

• Rejewski/Turing cracked Enigma, but had to invent the computer to do it.• And were also scarily, scarily good

mathematicians…

• Early computers (bombes) could search entire keyspace in about five hours.

Page 15: The History of Secrets Cryptography and Privacy

Viva la revolution!

• Enigma breakthrough classified MOST SECRET until 1975(!); some of Turing’s papers are still classified. Computer encryption is just too dangerous.

• BUT, it’s also too useful, especially for civilian/industrial uses like financial transfers

• Enter Data Encryption System (DES)

Page 16: The History of Secrets Cryptography and Privacy

DES

• Approved in 1975 by US govt. (NSA)• Non-classified uses only• 32,000,000,000,000,000 possible keys• Created “civilian” cryptography• Most analyzed system ever

Page 17: The History of Secrets Cryptography and Privacy

Questions about DES

• Why so few keys (fewer than 30 year old Enigma, but better mathematical structure)?

• NSA approved IBM’s initial design only after making a few changes. Why?

• Is there a secret “back door”? Is the government holding a master key?

• Is there a good replacement?

Page 18: The History of Secrets Cryptography and Privacy

Replacing DES

• DES held out much longer than originally planned, but (as expected) had too few keys.

• Modern computers can crack DES very fast.• … but no one really had a good replacement• 3DES used (late 90s) to extend keyspace• Advanced Encryption System (Rijndahl)

finally designed in 2001 as replacement. • No “secret” governmental involvement

Page 19: The History of Secrets Cryptography and Privacy

Public key encryption

• Problem with all cryptography, AES included -- a need for shared secret prior to communication

• How do I establish a shared secret with Amazon.com if I don’t work there? Can we avoid this?

• Surprising answer : Yes!• Decryption key can be different than

encryption key, allowing “public” keys!

Page 20: The History of Secrets Cryptography and Privacy

Merkle Puzzles (1975)

• I publish a huge collection of “puzzles.” You pick one to solve, and send me the solution.

• I look up the solution, and recognize which puzzle you solved. Everyone else has to solve all of the puzzles to recognize the solution.

• Work factor is number of puzzles• Avoids having to communicate beforehand

Page 21: The History of Secrets Cryptography and Privacy

RSA Encryption

• Named for inventors : Rivest, Shamir, and Adelman (Turing award winners, 2003)

• Uses a large product of two primes -- easy to multiply, but very hard to factor

• Two keys, d and e : you encrypt with e, while only I know (and can decrypt with) d.

• Reversible! I encrypt with d, you decrypt with e and you know I encrypted it!. In other words, it can be used as a signature!

• Work factor can be arbitrarily large -- “It’s easier to break thumbs than it is to break RSA”

Page 22: The History of Secrets Cryptography and Privacy

Power to the People : PGP

• Pretty Good Privacy• Written c. 1990 by Phil Zimmermann.

Military/diplomatic strength encryption, using private and public key cryptography.

• Believed unbreakable by anyone short of major governments, but “freely” available for personal/corporate use

• PGPfone -- similar technology for phones

Page 23: The History of Secrets Cryptography and Privacy

Political issues

• Should people be permitted this kind of security technology?

• I can keep secrets from my competitors, but also from law enforcement/national security enforcers!

• ITAR -- cryptographic equipment regulated as munitions (like machine guns)

• Only govt-approved (breakable) encryption permitted.

Page 24: The History of Secrets Cryptography and Privacy

More politics

• Clipper/Capstone chip -- “secure” phone with Law Enforcement Access Field to ensure wiretap capacity

• 40-bit (1,000,000,000,000 key) limit on commercially exported software

• Criminalization of cryptography per se (France, some other countries)

• USA/PATRIOT wiretap provisions• FBI operation CARNIVORE

Page 25: The History of Secrets Cryptography and Privacy

Discussion points

• The genie appears to be out of the bottle, in that the technology for secure encryption is widely available

• The roadblocks to widespread implementation are primarily social and political.

• Is civilian/personal cryptography a good thing or not?

Page 26: The History of Secrets Cryptography and Privacy

Conclusions

• Secret writing has a long (2000 yr) history• Military/diplomatic communications

driving force for most of history; personal/industrial privacy is secondary

• Modern cryptographic systems are both highly secure and widely available

• Omnipresent computers and ‘Net forcing us to re-evaluate view on security and privacy


Recommended