aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms41
1 files changed, 36 insertions, 5 deletions
diff --git a/paper.ms b/paper.ms
index 38a797f..1436e38 100644
--- a/paper.ms
+++ b/paper.ms
@@ -3,9 +3,9 @@ short-label D.y
sort spec
.R2
.TL
-Title
+Cryptography, crime, terror, and surveillance
.AU
-Mohit Agarwal
+\f[TI]Mohit Agarwal
.AI
February 2022
.LP
@@ -46,7 +46,9 @@ crime or terror?
Is combatting encryption an effective way to combat crime/terror?
.LP
-An argument is often made against digital privacy in the interest of
+An argument is often made against allowing widespread use of
+encryption and generally against widespread effective operations
+security (OPSEC)in the public sector in the interest of
national security. With access to communications and usage history law
enforcement and government can quickly discover large amounts of
information useful in a criminal investigation or in preventing
@@ -127,8 +129,7 @@ followed the increase in popularity of cars in areas such as the UK
and US, regulation will no doubt follow the newfound popularity of
heavy encryption. There are however, difference in the case of
encryption when compared to cars. The rate of change with modern
-technology is far greater. There are already discussions about quantum
-computers and their potential to overcome current encryption methods.
+technology is far greater.
In the case of encryption regulation will continuously struggle to
control encryption methods due in part to how quickly they change, but
perhaps moreso due to their decentralised nature, where a government
@@ -171,6 +172,27 @@ chip manufacturing bill} and Chinese governments (cite) are
respectively showing (the US and China are the two largest chip
manufacturers (cite, reword)).
+In addition, the rate of development in unconventional computing
+methods is increasing rapidly. Effective quantum computing will
+mean that existing popular cryptographic algorithms such as RSA will
+no longer be secure due to the potential for computations that would
+take unreasonable amounts of time on classical computers to be solved
+quickly (reword) such as prime factorisation on which RSA encryption
+relies {lily chen quantum}. RSA encryption is currently in use for
+applications such as private communications and digital signatures.
+Significant research such as at IBM in recent years (cite) has shown
+feasibility in current ideas surrounding quantum computing and
+promising results in development towards quantum supremacy and in the
+future the breakdown of current cryptographic methods.
+
+Indeed, there
+have already been claims (although disputed) to quantum supremacy from
+
+Once more, the significant research is occuring as afformentioned in
+the US and in China {quantum research in china}. Both in the US at
+Google {google supremacy nature} and in China {china quantum
+advantage}{science photons quantum advantage}.
+
Is discussion on this useful?
Individuals around the world have clearly expressed interest in
matters of privacy and encryption (cite) and open source software
@@ -265,4 +287,13 @@ Privacy
https://www.flurry.com/blog/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update/
https://www.bloomberg.com/news/articles/2021-07-14/facebook-fb-advertisers-impacted-by-apple-aapl-privacy-ios-14-changes
+Quantum computing
+ https://sci-hub.se/10.1007/978-3-540-88702-7_1
+ https://aapt.scitation.org/doi/abs/10.1119/1.1891170
+ https://ieeexplore.ieee.org/abstract/document/8490169
+ https://digitalcommons.dartmouth.edu/senior_theses/23/
+ https://www.sciencedirect.com/science/article/abs/pii/S1361372317300519
+ https://arxiv.org/abs/1804.00200
+
+
{firewall}