diff options
| author | root <root@turin.home> | 2022-02-15 21:09:26 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-02-15 21:09:26 +0000 |
| commit | 0b08878f0b03380ed35fbfc955fb9f84f54a4506 (patch) | |
| tree | c5053d42c0c6599f054e5c7f120b37461006cb88 | |
| parent | d7512378823fae3f6adde450042a12932ffc2e44 (diff) | |
Adding some reading. Expanding on implementation attacks. 2200 words.
| -rw-r--r-- | paper.ms | 27 |
1 files changed, 14 insertions, 13 deletions
@@ -37,18 +37,9 @@ liberties and could easily be exploited for reasons other than prevention of crime and terror. The successes and failures of government responses can be judged in various ways. -.IP i. 5 -To what extent does encryption enable either crime or terror? -.IP ii. 5 -Does the increased mainstream adoption of encryption better enable -crime or terror? -.IP iii. 5 -Is combatting encryption an effective way to combat crime/terror? -.LP - An argument is often made against allowing widespread use of encryption and generally against widespread effective operations -security (OPSEC)in the public sector in the interest of +security (OPSEC) in the public sector in the interest of national security. With access to communications and usage history law enforcement and government can quickly discover large amounts of information useful in a criminal investigation or in preventing @@ -191,7 +182,7 @@ have already been claims (although disputed) to quantum supremacy from Once more, the significant research is occuring as afformentioned in the US and in China {quantum research in china}. Both in the US at Google {google supremacy nature} and in China {china quantum -advantage}{science photons quantum advantage}. +advantage}{science photons quantum advantage}. Is discussion on this useful? Individuals around the world have clearly expressed interest in @@ -234,7 +225,14 @@ Modern cryptographic algorithms are `cryptographically secure`; the underlying theoretical concepts mean that breaking the encryption to intercept a communication is possible only through a brute-force attack and is therefore, due to the nature of the algorithm. This -however, does not consider implementational flaws. +however, does not consider implementational flaws. Indeed, +implementational flaws are the ways in which modern breaks of +algorithms such as RSA (cite) occur, and methods such as timing +attacks (cite) and voltage level analysis attacks, as well as memory +attacks (cold boot, rubber hose ...) (do some light explaining) (cite +all) have the potential to overcome any level of sophistication that +cryptographic algorithms may have, and simply give away information +such as keys (research, cite). .nr HY 0 .ad l @@ -294,6 +292,9 @@ Quantum computing https://digitalcommons.dartmouth.edu/senior_theses/23/ https://www.sciencedirect.com/science/article/abs/pii/S1361372317300519 https://arxiv.org/abs/1804.00200 - + +Surveillance + https://www.nytimes.com/2022/02/10/us/politics/cia-data-privacy.html + https://www.eff.org/deeplinks/2022/02/we-need-answers-about-cias-mass-surveillance {firewall} |
