11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

encryption 181Public key encryption allows users to communicate securely withouthaving to exchange their private keys. In part 1, person Apublishes a public key, which can be used by anyone else (such asperson B) to encrypt a message that only person A can read. In part2, person A encrypts a message with his or her private key. Sincethis message can only be encrypted using person A’s public key, personB can use the published public key to verify that the message isindeed from person A.mitted. Further, a user can distribute a message encryptedwith his or her private key that can be decrypted only withthe corresponding public key. This provides a sort <strong>of</strong> signaturefor authenticating that a message was in fact created byits putative author.In 1978, Ron Rivest, Adi Shamir, <strong>and</strong> Leonard Adelmanannounced the first practical implementation <strong>of</strong> public-keycryptography. This algorithm, called RSA, became the prevailingst<strong>and</strong>ard in the 1980s. While keys may need to belengthened as computer power increases, RSA is likely toremain secure for the foreseeable future.Legal ChallengesUntil the 1990s, the computer power required for routineuse <strong>of</strong> encryption was generally beyond the reach <strong>of</strong> mostsmall business <strong>and</strong> consumer users, <strong>and</strong> there was littleinterest in a version <strong>of</strong> the RSA algorithm for microcomputers.Meanwhile, the U.S. federal government tried to maintaintight controls over encryption technology, includingprohibitions on the export <strong>of</strong> encryption s<strong>of</strong>tware to manyforeign countries.However, the growing use <strong>of</strong> electronic mail <strong>and</strong> thehosting <strong>of</strong> commerce on the Internet greatly increased concernabout security <strong>and</strong> the need to implement an easy-touseform <strong>of</strong> encryption. In 1990, Philip Zimmermann wrotean RSA-based email encryption program that he calledPretty Good Privacy (PGP). However, RSA, Inc. refused togrant him the necessary license for its distribution. Further,FBI <strong>of</strong>ficials <strong>and</strong> sympathetic members <strong>of</strong> Congress seemedpoised to outlaw the use <strong>of</strong> any form <strong>of</strong> encryption that didnot include a provision for government agencies to decodemessages.Believing that people’s liberty <strong>and</strong> privacy were at stake,Zimmermann gave copies <strong>of</strong> PGP to some friends. The programsoon found its way onto computer bulletin boards,<strong>and</strong> then spread worldwide via Internet newsgroups <strong>and</strong>ftp sites. Zimmermann then developed PGP 2.0, which<strong>of</strong>fered stronger encryption <strong>and</strong> a modular design thatmade it easy to create versions in other languages. TheU.S. Customs Department investigated the distribution <strong>of</strong>PGP but dropped the investigation in 1996 without bringingcharges. (At about the same time a federal judge ruledthat mathematician Daniel Bernstein had the right to publishthe source code for an encryption algorithm withoutgovernment censorship.)Government agencies eventually realized that theycould not halt the spread <strong>of</strong> PGP <strong>and</strong> similar programs. Inthe early 1990s, the National Security Agency (NSA), thenation’s most secret cryptographic agency, proposed thatst<strong>and</strong>ard encryption be provided to all PC users in the form<strong>of</strong> hardware that became known as the Clipper Chip. However,the hardware was to include a “back door” that wouldallow government agencies <strong>and</strong> law enforcement (presumablyupon fulfilling legal requirements) to decrypt any message.Civil libertarians believed that there was far too muchpotential for abuse in giving the government such power,<strong>and</strong> a vigorous campaign by privacy groups resulted in them<strong>and</strong>atory Clipper Chip proposal being dropped by themid-1990s in favor <strong>of</strong> a system called “key escrow.” Thissystem would require that a copy <strong>of</strong> each encryption keybe deposited with one or more trusted third-party agencies.The agencies would be required to divulge the key if presentedwith a court order. However, this proposal has beenmet with much the same objections that had been madeagainst the Clipper Chip.In the early 21st century, the balance is likely to continueto favor the code-makers over the code-breakers.While it is rumored that the NSA can use arrays <strong>of</strong> supercomputersto crack any encrypted message given enoughtime, <strong>and</strong> a massive eavesdropping system called Echelonfor analyzing message traffic has been partially revealed, asa practical matter most <strong>of</strong> the world now has access to highqualitycryptography. Only radically new technology (seequantum computing) is likely to reverse this trend.Further ReadingCobb. Chey/ Cryptography for Dummies. Hoboken, N.J.: John Wiley& Sons, 2004.Henderson, Harry. Privacy in the Information Age (Library in aBook) 2nd ed. New York: Facts On File, 2006.“The International PGP Home Page.” Available online. URL: http://www.pgpi.org/. Accessed February 2, 2008.Levy, Stephen. Crypto. New York: Viking, 2001.Singh, Simon. The Code Book: the <strong>Science</strong> <strong>of</strong> Secrecy from Ancient Egyptto Quantum Cryptography. New York: Anchor Books, 2000.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!