Difference between revisions of "Encryption"
From MgmtWiki
(→Context) |
(→Solutions) |
||
(7 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
==Context== | ==Context== | ||
Many personal attributes and much valuable content are meant to be kept hidden from all but a chosen few. Encryption enables that. It also can enable [[Signing]] and [[Authentication]], but those are addressed elsewhere. | Many personal attributes and much valuable content are meant to be kept hidden from all but a chosen few. Encryption enables that. It also can enable [[Signing]] and [[Authentication]], but those are addressed elsewhere. | ||
+ | ==Problems== | ||
+ | * Encryption that cannot be broken by adversaries depends ultimately on one-way processes that cannot be determined by the result. | ||
+ | * Sometime the one-way functions turn out to be vulnerable. The most recent vulnerability was found with a combination of quantum computing an Schnor's algorithm. See the wiki page on [[Quantum Computing Threat]] for details and possible solutions. | ||
+ | * It is prudent to think that all existing encryption techniques of today will become vulnerable in the future, it is advisable to always exploring for new one-way functions that will not be vulnerable to attacks in the near future. | ||
− | == | + | ==Solutions== |
+ | Programmable encryption <ref>J. M. Trinidad, ''Programmable encryption for wireless and network applications'' IEEE Milcom 2002 https://ieeexplore.ieee.org/document/1179681</ref> provides for future updates to encryption algorithms. <blockquote>The evolution of encryption technology has moved from large electromechanical boxes to printed wiring assemblies to embeddable integrated circuits. Along the way, a variety of cryptographic algorithms have emerged to address different applications, speeds and communications media. From a security perspective, there is often a need to keep these various systems distinct and isolated. From a communications perspective, there is often a need for interoperability among many of the systems. As advancing technology has allowed many systems to be consolidated into few (e.g., the Joint Tactical Radio System), the need for interoperability between different cryptographic devices has increased. This increased need for interoperability is also being driven by changing mission needs such as Homeland Security and joint operations with allied forces. In the context of this paper, programmable encryption is defined as the ability of a cryptographic device to be loaded with new information that enables it to interoperate with a variety of encryption devices, both fielded and yet to come. This paper addresses in more detail the need for programmable encryption, the USA government's position on the subject, applicability to current and future government programs, current state of the technology, technical and performance tradeoffs. implementation methods, and expectations of what the future holds in this arena.</blockquote> | ||
+ | |||
+ | ==References== | ||
[[Category: Glossary]] | [[Category: Glossary]] |
Latest revision as of 06:16, 28 April 2022
Full Title or Meme
Secret writing.
Context
Many personal attributes and much valuable content are meant to be kept hidden from all but a chosen few. Encryption enables that. It also can enable Signing and Authentication, but those are addressed elsewhere.
Problems
- Encryption that cannot be broken by adversaries depends ultimately on one-way processes that cannot be determined by the result.
- Sometime the one-way functions turn out to be vulnerable. The most recent vulnerability was found with a combination of quantum computing an Schnor's algorithm. See the wiki page on Quantum Computing Threat for details and possible solutions.
- It is prudent to think that all existing encryption techniques of today will become vulnerable in the future, it is advisable to always exploring for new one-way functions that will not be vulnerable to attacks in the near future.
Solutions
Programmable encryption [1] provides for future updates to encryption algorithms.The evolution of encryption technology has moved from large electromechanical boxes to printed wiring assemblies to embeddable integrated circuits. Along the way, a variety of cryptographic algorithms have emerged to address different applications, speeds and communications media. From a security perspective, there is often a need to keep these various systems distinct and isolated. From a communications perspective, there is often a need for interoperability among many of the systems. As advancing technology has allowed many systems to be consolidated into few (e.g., the Joint Tactical Radio System), the need for interoperability between different cryptographic devices has increased. This increased need for interoperability is also being driven by changing mission needs such as Homeland Security and joint operations with allied forces. In the context of this paper, programmable encryption is defined as the ability of a cryptographic device to be loaded with new information that enables it to interoperate with a variety of encryption devices, both fielded and yet to come. This paper addresses in more detail the need for programmable encryption, the USA government's position on the subject, applicability to current and future government programs, current state of the technology, technical and performance tradeoffs. implementation methods, and expectations of what the future holds in this arena.
References
- ↑ J. M. Trinidad, Programmable encryption for wireless and network applications IEEE Milcom 2002 https://ieeexplore.ieee.org/document/1179681