Cryptography Book-Review: Era of Exponential Encryption |
Book-Review: Era of Exponential Encryption Posted: 23 Dec 2018 04:25 PM PST The term "Era of Exponential Encryption" has been coined by Mele Gasakis and Max Schmidt in their book "Beyond Cryptographic Routing". Herein they describe the development within cryptography to multiply several methods, values and constants. Based on the therein provided analyzes and recent innovations in cryptography they provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes: Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both encryption and decryption require more session-related and multiple keys, so that numerous options exist for configuring encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption: Ciphertext is converted again and again to ciphertext. It will be analyzed how a handful of newer applications and open source software programming implement these encryption mechanisms. Multiplication towards Exponential Next to hybrid-encryption, which means to apply both, symmetric and asymmetric encryption or vice versa, also multi-encryption is mentioned, in which a ciphertext is encrypted to ciphertext and, again, several times to ciphertext - possibly and intended with different methods or algorithms. Further the turn back from session keys, so called ephemeral keys, towards a renewal of the session key by instant options for the user to renew the key several times within the dedicated session. That has forwarded the term of "perfect forward secrecy" to "instant perfect forward secrecy" (IPFS). But even more, if in advance a bunch of keys is sent, a decoded message has to consider not only one present session key, but also over dozens of keys sent prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco keys. Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and defines Fiasco Forwarding, the approach, which complements and follows IPFS. Fiasco Keys have been coded into several application like Smoke (Client) and SmokeStack (Chatserver). They provide in contrast to other more static and schematic protocols like the Signal protocol a vision into a more volatile world of encryption. And further, adding routing- and Graph Theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This and the sum off all these innovations and development features described within the book "Beyond Cryptographic Routing" multiply also the options an invader against a defined encryption has to consider - and shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If ciphertext is then sent over the Internet, there exist also the manifold options in the networks of the analyzed applications that messages take undefined routes or even routes defined with cryptographic tokens. If the routing- and graph-theory is paired with encryption, the network theory of computer science gets quite new dimensions: Based on the development of various proxy- or mix-networks, such as the well known Tor-network (and further analyzed in the book), a development from so-called "onion routing" to "echo discovery" is described: That means the route of a packet to be sent can no longer be defined, as each node in the network independently decides the next hop. The special case of a "sprinkling network" describes the learning of servers and nodes based on these cryptographic tokens. This Adaptive Echo offers advantages and disadvantages compared to the previous mix networks. It is therefore not spoken in these flooding networks from the concept of "routing", as we know it from the well known TCP protocol, but of "discovery": If the cryptographic token is matching, the message belongs to me. The so-called Echo-Protocol is an example of the change from Onion Routing to Echo Discovery. Is it also a new option for new, better encryption in the network? If routing does not require destination information but is replaced by cryptographic insights, then it is "beyond cryptographic routing". Will servers of the network landscape learn in the future through cryptographic tokens, which route a packet takes within the Internet and to which recipient it should be delivered and which recipient it should not be forwarded to? Well-known alternatives to WhatsApp Messenger have announced that they will replace the sender with a cryptographic token, and thereby approach this property of the Echo that has existed for many years. At the same time, the authors are also analyzing a new way of thinking and working in the time after the Snowden Papers, which differs from industrial development work for encryption programs to community-oriented open source developments. These in particular have, can and will (detached from the well-known Experts Insider circles) arise innovations in cryptography such as cryptographic calling: In this process, numerous keys for end-to-end encryption are promptly and several times within one push of a button individually defined and renewed after a user request. Only a few programs can do this. Which they are, analyze the authors using various examples and selected innovations in the cryptographic software programming of recent years. The Echo Protocol, which is applied in a handful of software applications, is in this regard an initial welcome within the Era of Exponential Encryption. According to this, every message is encrypted several times and each network node sends a packet to all known neighbors. This compares and transforms classic mix networks like Tor or I2P and other to a new kind of flooding networks. Four Arms within the Era of Exponential Encryption The authors identify four arms within the "Era of Exponential Encryption", which refer to multi-encryption: the conversion from ciphertext to ciphertext, Meta-data Resistance, and third, the increasing diversification of cryptographic parameters: Key variables or applied algorithms, as well as the trend towards new algorithms such as NTRU and McEliece, which are so far considered to be particularly secure against the attacks of the fast Quantum Computing|antum computers]] # multi-encryption as a result of numerous disruptive innovations in cryptography: Multi-Encryption is the conversion of ciphertext to ciphertext, if both asymmetric and symmetric methods are used, hybrid multi-encryption can be used. # Avoiding Meta-data and Resistance to Meta-data Analysis: Big user data has become a gray fog or noise factor, which makes it difficult to decipher and in which a user may also hide with secret messages. # Diversification of the user-defined cryptographic parameters: Users can use numerous algorithms, the individual cryptographic-DNA has been highly individualized # Switching from RSA to NTRU and [McEliece]] as a strengthening of Resistance to Quantum Computing: Since 2016, RSA has been officially insecure. Short, but fact. Switching to NTRU and McEliece plays a central role. Implications From these developments, social, legal, political and economic recommendations are derived, which are to be discussed more intensely, especially in eduational processes: Our schools need more teaching and learning processes that understand and convey the beginning of the increasingly exponential cryptography. Social implications "'The liberty of the other begins with the acceptance of his or her ciphertext' - if the known quotation from Rosa_Luxemburg (1918) may be applied to the next century in this wording. If it is difficult to accept the limits of the readable opinion of the other, how easily should one fall to accept the limits of the unreadable opinion of the other?", the authors ask. They suggest, that multipliers within social groups help others to get a common understanding for cryptographic processes in society and for private people. Legal implications The new status in the Era of Exponential Encryption shows that the legal requirements to judge cases are becoming more complex: e.g. if non-license-free material is forwarded in an encrypted packet or if only "non-routed" communication content has to be decoded in a legal case – or if an Internet Service Provider should be able to decrypt at all? - The authors suggest to provide professional education already at high school for all law concerned professions. Political implications Here the question is raised, how much competence development in a particular nation should this nation request? and how can political processes steer this? The authors suggest that encryption must be a well accepted science and practical process in politics and by politicians. Economic implications Encryption is a basic process of the digital economy. The authors suggest that an initiative should equal the open source software with proprietary encryption solutions. Outlook A pleading for the compulsory subject computer-science already in school? - In any case, the so-called "digital immigrants" as well as members of the "generation Y", who have grown up with the mobile phones, continue to develop the content of the cryptography in the curricula of schools and to discuss the described innovations and questions towards the "Era of Exponential Encryption ". It is a book that appeals to interested persons of computer science, math, and cryptography as well as students who want to discuss new cryptographic innovations in tutorials and crypto-parties. It is in the opinion of the authors necessary to develop teaching concepts that lead non-MIT and non-math students to cryptology & cryptography and, secondly, to address also the other group of non-students: technically interested people who have never seen a university from inside but are interested in technical development. Here, in the area of encryption, every reader and user is asked to consider how to learn, how to deepen the existing knowledge and to be learned content as well as practical application of the know-how of encryption. Bibliography The book has been provided in two forms: as a hardcover with ISBN and as a PDF/ epub Format: Gasakis, Mele / Schmidt, Max: Beyond Cryptographic Routing: The Echo Protocol in the new Era of Exponential Encryption (EEE) - A comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, Graph-Theory, Routing and the change from Mix-Networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol, ISBN 978-3-7481-5198-2, 2018. [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment