Fed2 Star - the newsletter for the space trading game Federation 2

The weekly newsletter for Fed2
by ibgames

EARTHDATE: June 14, 2015

Fed2 Star last page Fed2 Star: Official News page 10 Fed2 Star index

WINDING DOWN

An idiosyncratic look at, and comment on, the week's net, technology and science news
by Alan Lenton

There’s a temporary change of format this week. I wanted to discuss the problems with proposals to cripple encryption by various western (and other) leaders. It turned out to be a somewhat longer piece than I anticipated. So, it takes up virtually all of this week’s Winding Down, except for a couple of URLs on a NASA CubeSat mission to Mars, bladeless wind turbines, and road pothole avoidance the Land Rover way!

Normal service will be resumed next week – I hope...

Analysis: Keeping things safe

When you access your online banking you expect that only the bank can read your instructions to make transfers to other accounts. To do that the link between the two computers – yours and the bank’s – is encrypted. The same goes for other confidential things you want to send over the internet.

Unfortunately, the right to use secure encryption is under attack in many countries at the moment. Both the leaders of the US and UK are currently running campaigns to insist that a ‘back door’ be built into encryption, so that various parts of the state can read the information being sent. All sorts of excuses are being given – terrorists use encryption, child pornographers use encryption, criminals use encryption – the list is endlessly inventive.

One reason you don’t hear, is the suggestion that the lessons of history show that we need to allow the government to read everything we write or say. Politicians are remarkably well armoured against the outrageous slings and arrows of history. Especially when those lessons show something has been tried before and didn’t work!

So, for a look at the historical lesson of ‘back doors’ in encryption, I’d like to take you back to the days of the 1990s in the USA, but first I need to explain a bit about encryption itself. Don’t worry – it’s all non-technical!

Encryption has been around for a very long time. It consists of two things – a method of encrypting something and some sort of key (or pair of keys) that can be used to encrypt and decrypt the message. Theoretically, you could try and keep both the method and the key a secret, although experience has proved that it’s not that easy to keep the method a secret. The important thing therefore is keeping the key a secret. This is fine for secret agents – you give them the key before you send them off, and hope they don’t lose it or get captured.

The key, of course, must be long enough, and arbitrary enough, that you can’t break the code just by trying all possible variations of the letters and numbers making up the key. Assuming you get all that correct (and you’d be surprised how many amateurs fail to get everything right), and your method has no built in weaknesses, it should be possible to communicate securely. That applies even over a public, open, service like the internet, where, at least theoretically, anyone can listen in.

However, there is one problem: what happens if the parties involved (traditionally known as Alice and Bob) have never met, and so don’t have a shared key? Think about it – you want to access your bank account on the internet, you wouldn’t really want to pop down to the bank to give the several thousand noughts and ones to use as a key, would you?

Nope – not unless you have strong masochistic tendencies. Fortunately, in the 1990s Whitfield Diffie and Martin Hellman came up with a mathematical method for Alice and Bob to share keys, even if they’ve never had physical contact to share the key. it’s called, unsurprisingly, Diffie-Hellman key exchange. You don’t need to know the details of how it’s done, but the system is now used as part of the HTTPS protocol. That means that you use it every time you log on to a secure web site (like your bank) with your browser. It also part of SSH, used by system administrators to log on to servers remotely, and VPN used by employees to log into servers remotely.

OK. So still back in the 1990s, we have a problem with this key exchange. Not a technical problem, I hasten to add, but a political problem. It’s too good, and too difficult to break the keys generated, if implemented properly. Because of this, the US government, especially the then little known NSA, were not allowing US companies to sell encryption software, especially the key exchange software, abroad. (As an aside the NSA up to that time had successfully stifled the use of encryption by not allowing research into it to be published, and issuing gagging orders.)

Eventually companies were permitted to sell abroad after an addition was made to the protocol so that if a special sequence was injected into the traffic, a new key would be computed, and that this key would only be a very short key, which would be easy to break. This sequence was, of course known to the likes of the NSA. The problem is, of course, that now everyone knows about it: it’s the Logjam Attack (also known as the Diffie-Hellman Downgrade Attack) that’s been in the news recently.

In this case it was found and publicized by a researcher. But who knows who else has found it and used it in the last 20 or so years? The UK? China? Russia? Germany? Israel? Al-Qaeda? ISIS?

Which brings us to the point that the likes of David Cameron and Barack Obama fail, or refuse, to understand. There is no such thing as a ‘back door’ that’s just for the ‘good’ guys. If there’s a back door, sooner or later the bad guys will discover and use it. And the bigger the bad guys are – think, perhaps, China – the sooner they will discover the back door into the encryption.

There are many other reasons why the organs of government shouldn’t be able to pry into your encrypted traffic, but this is, if you like, the main technical reason – it opens it to everyone, not just law enforcement – for being opposed to ‘back door’ plans. The other reasons are much more in the realm of politics, and outside the remit of this newsletter.

Coda: If anyone uses the other, fatuous, ‘What have you got to hide?’ argument, just ask them if they have any objection to you installing a web camera in their bathroom. When they say they do have objections, ask them what they’ve got to hide...
http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/
https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
https://en.wikipedia.org/wiki/Clipper_chip

Scanner:

NASA preparing for its first interplanetary CubeSat mission to Mars
http://www.techienews.co.uk/9733758/nasa-preparing-for-its-first-interplanetary-cubesat-mission-to-mars/

Vortex bladeless turbines wobble to generate energy
http://www.gizmag.com/vortex-bladeless-wind-turbine-generator/37563/

Want to avoid potholes on roads? Jaguar Land Rover has the answer
http://www.techienews.co.uk/9733731/want-to-avoid-potholes-on-roads-jaguar-land-rover-has-the-answer/

Acknowledgements

Thanks to readers Andrew, Barb and Fi for drawing my attention to material for Winding Down.

Please send suggestions for stories to alan@ibgames.com and include the words Winding Down in the subject line, unless you want your deathless prose gobbled up by my voracious Thunderbird spam filter...

Alan Lenton
alan@ibgames.com
14 June 2015

Alan Lenton is an on-line games designer, programmer and sociologist, the order of which depends on what he is currently working on! His web site is at http://www.ibgames.net/alan/index.html.

Past issues of Winding Down can be found at http://www.ibgames.net/alan/winding/index.html.

Fed2 Star last page   Fed2 Star index