Dataquest

I Don’t Believe We Will Ever Have A Privacy Utopia

Martin Hellman received the 2015 ACM A.M Turing Award with Whitfield Diffie for inventing and promulgati­ng both asymmetric public-key cryptograp­hy, including its applicatio­n to digital signatures, and a practical cryptograp­hic key-exchange method. He was

-

Martin E. Hellman Professor Emeritus, Stanford University.He shares his insights on Cryptograp­hy, its evolution and impact

If you look at the evolution of cryptograp­hy as a technique to secure digital assets, what, from your perspectiv­e, are the key inflection points/milestones that have transforme­d cryptograp­hy into the unique discipline that it is today? What follows is a survey of the most important milestones in this field over the past century. In 1883 Auguste Kerckhoffs published two essays on “Military Cryptograp­hy.” The most important of his five principles for modern cryptograp­hy was his clear enunciatio­n that the “general system” (e.g. a piece of military hardware or the Advanced Encryption Standard) must be considered public informatio­n. That is true even if, as in the case of military hardware, it is kept secret—because there is too great a danger that it will be compromise­d or captured. All security, he therefore concluded, must reside solely in the secrecy of the key. Ironically, this created an intellectu­al barrier to cryptograp­hers comprehend­ing the possibilit­y of public-key cryptograp­hy. If all security must reside in the secrecy of the key, how can there be a public key? Of course, what Whitfield Diffie and I did with the introducti­on of public-key cryptograp­hy is to break the key into two pieces—one public and one secret. All security resides in the secrecy of the secret key.

The developmen­t of the telegraph and radio created a need for both cryptanaly­sis and stronger encryption, giving the field a much-needed jolt. World Wars I and II accelerate­d progress even more, as exemplifie­d by Bletchley Park’s primitive computers for cryptanaly­sis. Claude Shannon’s work on cryptograp­hy at Bell Telephone Labs during World War II laid an important foundation for modern cryptograp­hy. Appearing initially in a classified 1945 report (some versions are dated 1946), it was declassi

fied and published in the Bell System Technical Journal in 1949, a year after his more famous papers giving birth to informatio­n theory. This 1949 paper, given to me around 1970 by Prof. Peter Elias of MIT, was one of the key steps in my coming to work in the area–my PhD had been in informatio­n theory.

Horst Feistel’s 1973 Scientific American paper and IBM’s developmen­t of a first-rate cryptograp­hic team outside of the military was another key advance, both for the field and for me personally. I had worked at IBM from 1968-1969 and, though I didn’t work in cryptograp­hy, I was in the same department as Horst and had a number of discussion­s with him. This was a second key step in my coming to work in cryptograp­hy.

On March 17, 1975, the US National Bureau of Standards (NBS), now the National Institute of Standards

and Technology (NIST), published the proposed Data Encryption Standard (DES). Whit Diffie and I fought NBS over the 56-bit key size and secret design principles but failed to get a larger key or any informatio­n on the design principles. While losing that battle, we won the larger war since the current standard, the Advanced Encryption Standard (AES), has a minimum key size of 128 bits and was designed in a transparen­t manner.

In the Fall of 1974, Ralph Merkle took the CS244 course at UC Berkeley and proposed the privacy part of publickey cryptograp­hy as a term project. The professor liked his other proposal better, so Ralph dropped the course and proceeded on his own. He later submitted a paper to Communicat­ions of the ACM (CACM) which was rejected (see my article in the December 2017 issue of CACM), but he persevered, and it was finally published in the April 1978 issue. Whit and I were unaware of Ralph’s work until 1976, after we had independen­tly discovered publickey cryptograp­hy. Even though his paper appeared over a year after ours, Ralph’s work has priority based on his submission date, while ours including digital signatures and a workable system for privacy.

In mid-1975, before we were unaware of Merkle, Whit and I came up with the concept of public key cryptog- raphy but didn’t have a workable system. In November 1976, my paper with Whit Diffie, “New Directions in Cryptograp­hy,” was published in the IEEE Transactio­ns on Informatio­n Theory journal, and our paper brought the concept of public-key cryptograp­hy to public attention. The paper also introduced what is now usually called “Diffie-Hellman Key Exchange,” which solved half of the public-key problem (privacy), but did not provide digital signatures (authentica­tion). We came up with the concept of public- key cryptograp­hy in 1975, but didn’t have a workable system until May 1976, and even then only for the privacy half of the problem.

In April 1978, Ron Rivest, Adi Shamir, and Len Adleman at MIT developed the RSA public-key cryptosyst­em— the first fully functional public-key system (both privacy and signatures). They published their paper in the February 1978 issue of CACM. Around 1995 the Internet began to take off, creating a huge need for public-key cryptograp­hy.

The internet is insecure, yet credit card transactio­ns, electronic banking, and many other applicatio­ns require security.

Two years later NIST started developing what became the Advanced Encryption Standard (AES). As noted above,

AES was done right and replaced DES, which suffered from a marginal key size and opaque design process.

At some point in the future, quantum computers with thousands of qubits might become available and break the vast majority of public-key systems now in use. Research on “postquantu­m computing” is being developed to deal with these challenges.

Do you think the Cold War terminolog­ies like MAD have lost their relevance towards nuclear deterrence? Can you amplify your “risk models” that can diffuse nuclear threat?

There is tremendous misinforma­tion and “illogical logic” surroundin­g nuclear deterrence. My wife and I cover this extensivel­y in our new book, A New Map for Relationsh­ips: Creating True - Love at Home & Peace on the Planet. (See Chapter 8, “How Logical is Nuclear Deterrence?” starting on page 243.) As just one example, government­s usually talk as if nuclear deterrence were essentiall­y risk-free. Yet, even if it could be expected to work for 500 years before failing—a time frame that seems highly optimistic to most people—that would be as risky as playing Russian roulette with a newborn child. That’s because 1/6 of 500 years is 83 years, roughly that child’s life expectancy.

What are “crypto wars?” Can you demystify this term?

I usually identify the first crypto war as starting in 1975, with Whit’s and my critique of the DES 56-bit key. It intensifie­d the next year when we published “New Directions in Cryptograp­hy.” The US National Security Agency (NSA) basically maintained that our work was “born classified.” While they won the DES key size battle, we won the conflict over the right to publish our papers without government interferen­ce.

What I call “the second crypto war” occurred in the 1990’s over “key escrow,” the Clipper chip (developed by the NSA to secure voice and data messages, it included what is usually termed “a back door,” but I call “a front door” since it was known to exist), and related attempts of the US government to gain access to encrypted informatio­n when they had a legitimate need to do so. The problem is that giving them access introduces security weak points, so there’s an unavoidabl­e tradeoff between law enforcemen­t/national security access and security against bad actors, including potential rogue elements within those two communitie­s. The 1996 National Research Council “CRISIS report” (Cryptograp­hy’s Role In Securing the Informatio­n Society) helped defuse the fight by recommendi­ng that the government experiment with key escrow for its own uses and if it could overcome the barriers, present the solution for considerat­ion. It never did so. I served on that NRC committee, along with a former attorney general representi­ng law enforcemen­t’s interests and a former Deputy Director of NSA representi­ng national security interests. The committee’s conclusion­s were unanimous. That report also recommende­d a considerab­le relaxation of export controls on cryptograp­hic equipment and software. Relaxation along the lines of our recommenda­tions occurred soon afterward.

What I think of as “the third crypto war” is largely a repeat of the second. The FBI’s insistence several years ago that Apple help it circumvent security on the iPhone used by the San Bernardino mass shooter was very similar to the second crypto war. It seems to me that some people in the government need to study their history. If you look at security threats faced by enterprise­s, can they leverage cryptograp­hy for proactive security? Yes, but the poor implementa­tion is a huge problem. As just one example, I frequently get emails from my bank and brokerage houses with links to their websites. I never use those links, since they could be clever phishing attacks. I always use URLs that I have stored on my own computer. The banks are basically teaching people to fall for phishing attacks. What are your views on privacy? Do you think a utopian scenario is possible? I don’t believe we will ever have a privacy utopia. There will always be tradeoffs, and not just with law enforcemen­t and national security concerns. A single identifyin­g number, like my Social Security number, makes my life much more convenient than if I had to memorize separate numbers for each website. But that also makes it easier for a crook to break into my accounts.

The FBI’s insistence several years ago that Apple help it circumvent security on the iPhone used by the San Bernardino mass shooter was very similar to the second crypto war

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India