aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-02-15 21:09:26 +0000
committerroot <root@turin.home>2022-02-15 21:09:26 +0000
commit0b08878f0b03380ed35fbfc955fb9f84f54a4506 (patch)
treec5053d42c0c6599f054e5c7f120b37461006cb88 /paper.ms
parentd7512378823fae3f6adde450042a12932ffc2e44 (diff)
Adding some reading. Expanding on implementation attacks. 2200 words.
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms27
1 files changed, 14 insertions, 13 deletions
diff --git a/paper.ms b/paper.ms
index 1436e38..e739c24 100644
--- a/paper.ms
+++ b/paper.ms
@@ -37,18 +37,9 @@ liberties and could easily be exploited for reasons other than
prevention of crime and terror. The successes and failures of
government responses can be judged in various ways.
-.IP i. 5
-To what extent does encryption enable either crime or terror?
-.IP ii. 5
-Does the increased mainstream adoption of encryption better enable
-crime or terror?
-.IP iii. 5
-Is combatting encryption an effective way to combat crime/terror?
-.LP
-
An argument is often made against allowing widespread use of
encryption and generally against widespread effective operations
-security (OPSEC)in the public sector in the interest of
+security (OPSEC) in the public sector in the interest of
national security. With access to communications and usage history law
enforcement and government can quickly discover large amounts of
information useful in a criminal investigation or in preventing
@@ -191,7 +182,7 @@ have already been claims (although disputed) to quantum supremacy from
Once more, the significant research is occuring as afformentioned in
the US and in China {quantum research in china}. Both in the US at
Google {google supremacy nature} and in China {china quantum
-advantage}{science photons quantum advantage}.
+advantage}{science photons quantum advantage}.
Is discussion on this useful?
Individuals around the world have clearly expressed interest in
@@ -234,7 +225,14 @@ Modern cryptographic algorithms are `cryptographically secure`; the
underlying theoretical concepts mean that breaking the encryption to
intercept a communication is possible only through a brute-force
attack and is therefore, due to the nature of the algorithm. This
-however, does not consider implementational flaws.
+however, does not consider implementational flaws. Indeed,
+implementational flaws are the ways in which modern breaks of
+algorithms such as RSA (cite) occur, and methods such as timing
+attacks (cite) and voltage level analysis attacks, as well as memory
+attacks (cold boot, rubber hose ...) (do some light explaining) (cite
+all) have the potential to overcome any level of sophistication that
+cryptographic algorithms may have, and simply give away information
+such as keys (research, cite).
.nr HY 0
.ad l
@@ -294,6 +292,9 @@ Quantum computing
https://digitalcommons.dartmouth.edu/senior_theses/23/
https://www.sciencedirect.com/science/article/abs/pii/S1361372317300519
https://arxiv.org/abs/1804.00200
-
+
+Surveillance
+ https://www.nytimes.com/2022/02/10/us/politics/cia-data-privacy.html
+ https://www.eff.org/deeplinks/2022/02/we-need-answers-about-cias-mass-surveillance
{firewall}