From 0b08878f0b03380ed35fbfc955fb9f84f54a4506 Mon Sep 17 00:00:00 2001 From: root Date: Tue, 15 Feb 2022 21:09:26 +0000 Subject: Adding some reading. Expanding on implementation attacks. 2200 words. --- paper.ms | 27 ++++++++++++++------------- 1 file changed, 14 insertions(+), 13 deletions(-) (limited to 'paper.ms') diff --git a/paper.ms b/paper.ms index 1436e38..e739c24 100644 --- a/paper.ms +++ b/paper.ms @@ -37,18 +37,9 @@ liberties and could easily be exploited for reasons other than prevention of crime and terror. The successes and failures of government responses can be judged in various ways. -.IP i. 5 -To what extent does encryption enable either crime or terror? -.IP ii. 5 -Does the increased mainstream adoption of encryption better enable -crime or terror? -.IP iii. 5 -Is combatting encryption an effective way to combat crime/terror? -.LP - An argument is often made against allowing widespread use of encryption and generally against widespread effective operations -security (OPSEC)in the public sector in the interest of +security (OPSEC) in the public sector in the interest of national security. With access to communications and usage history law enforcement and government can quickly discover large amounts of information useful in a criminal investigation or in preventing @@ -191,7 +182,7 @@ have already been claims (although disputed) to quantum supremacy from Once more, the significant research is occuring as afformentioned in the US and in China {quantum research in china}. Both in the US at Google {google supremacy nature} and in China {china quantum -advantage}{science photons quantum advantage}. +advantage}{science photons quantum advantage}. Is discussion on this useful? Individuals around the world have clearly expressed interest in @@ -234,7 +225,14 @@ Modern cryptographic algorithms are `cryptographically secure`; the underlying theoretical concepts mean that breaking the encryption to intercept a communication is possible only through a brute-force attack and is therefore, due to the nature of the algorithm. This -however, does not consider implementational flaws. +however, does not consider implementational flaws. Indeed, +implementational flaws are the ways in which modern breaks of +algorithms such as RSA (cite) occur, and methods such as timing +attacks (cite) and voltage level analysis attacks, as well as memory +attacks (cold boot, rubber hose ...) (do some light explaining) (cite +all) have the potential to overcome any level of sophistication that +cryptographic algorithms may have, and simply give away information +such as keys (research, cite). .nr HY 0 .ad l @@ -294,6 +292,9 @@ Quantum computing https://digitalcommons.dartmouth.edu/senior_theses/23/ https://www.sciencedirect.com/science/article/abs/pii/S1361372317300519 https://arxiv.org/abs/1804.00200 - + +Surveillance + https://www.nytimes.com/2022/02/10/us/politics/cia-data-privacy.html + https://www.eff.org/deeplinks/2022/02/we-need-answers-about-cias-mass-surveillance {firewall} -- cgit v1.2.3