Obama: cryptographers who don't believe in magic ponies are "fetishists," "absolutists"

Good point! I was thinking input bounderies and you went for format string :).

3 Likes

Thank Douglas Adams. After all, 6 x 9 = 42 (in base 13).

4 Likes

1,3 + 15,7 + 13 = 30

They didn’t say you could only use the numbers. Of course, it still looks odd in countries that don’t use the comma for the decimal delimiter…

7 Likes

If you’re going to steal the commas, then I’ll steal the parentheses:
15 + 15 + () =30.

3 Likes

I swear I learned everything I know about computer security from the story, “The Monkeys Paw”

4 Likes

And there will always be a sufficient number of those smart people among the terrists and drug dealers, inasmuch as their motivation is much higher than that of the gen pop.

1 Like

So . . . what’s so terrible about POTUS, someone who doesn’t claim any technical prowess, soliciting the cooperation of the industry (which has plenty) to try to keep some sort of situation roughly analogous to current physical search & seizure standards (imperfect as they may be) on the cards?

Because what we’ll be headed for soon enough is that using strong crypto the government cannot be given access to will be a crime in itself. And their method of gaining access will be to detain subjects–anyone they see using it and they’re interested in–until such time as they produce the key.

That won’t be so very cool either. Not wanting to go there is a good thing.

What the technical possibilities really are? I suspect they aren’t nearly as simple as Cory would like to paint them, in spite of his continual attendance at SXSW. But THAT’s what he’s asking help with. He isn’t saying “hand over the unicorn,” he’s asking, “Do you think we might be able to fashion something like a unicorn? Because the alternatives aren’t all that great. Give me a hand here.”

Now folks like Cory seem to be very, very interested in keeping up the idea that collaborating with the government on such a thing would be a horrible betrayal and essentially peer pressuring folks into not even thinking about this. I suggest, even in spite of all the SXSWs Cory can claim to have attended, that you might want to do the moral calculus yourself.

Cryptonomicon is a really enjoyable novel. One of my favorites . . . but the world Stephenson imagines is kinda milquetoast compared to the one we’ve got. I think we’ve all gotta actually think on this one–including likely moves and counter moves by all the parties here. Obama’s hope for a third way may be more than a bit sanguine, but I’m glad he’s trying. And I think there are probably technical possibilities SXSW hasn’t brought to Cory’s attention.

Let me know when that request to change the speed of light works out.

2 Likes

Yeah, just keep repeating the new catchphrase in various permutations. Kinda weird that decrypting a message should be equivalent to changing the speed of light. Oh, you say UNLESS you have the decrypt key. Oh. So, unlike the speed of light there are exceptions in this case! Wow. Who’d have thought to see someone reusing a lame, inappropriate analogy on this particular topic?

So, what other exceptions can we create? Can we have relatively strong encryption with a different keying protocal that would create more, manageable exceptions? I think the answer is a technical one, not an axiomatic one. And I think the answer is likely yes, or we wouldn’t see the urgency put behind towing the line on this one.

I put it the way I did to highlight the fact that it is a a ridiculous request.

The ability to have a key that “only the good guys can use” is not a new idea. This is a problem that people in the field of cryptography have thought about, for decades, and determined is not possible. The “why don’t you guys try a little harder” approach doesn’t work, when all of the experts are in agreement that creating multiple keys causes more problems than it solves.

Incidentally, welcome to the BBS.

4 Likes

Nothing at all.

However, when the nearly-unanimous response from the people he has solicited for help is “That’s mathematically impossible to do - the choices are between encryption that is secure against everyone, and encryption that is insecure against anyone determined to crack it,” the POTUS should say, “Cool, that’s what I wanted to know,” not, “Don’t be absolutists. Of course it’s possible. You just have to think harder.”

That sounds like a ridiculously pessimistic view of the future, considering that the encryption that your browser uses to connect to Google is “strong crypto the government cannot be given access to.”

Don’t trust Cory’s opinion? Let’s see what 14 people who the NYT calls “14 of the world’s pre-eminent cryptographers and computer scientists,” have to say.

“Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend. […]The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”

Direct link to the report:
http://dspace.mit.edu/handle/1721.1/97690

Can you come up with any cryptographers arguing the opposite?

No, he has already been told, by pretty much everyone who knows the math, “Horses we can give you. Cloven hooves? Maybe. White hair? Quite possible. Given time and effort, maybe even the forehead horn we can do. But the only-likes-virgins thing? That’s magic, not science.”

Oh, you. I wasn’t suggesting he read Cryptonomicon because of the story. I was suggesting that he read it because it’s packed with details about what cryptography can and cannot do - and President Obama needs a refresher on that.

7 Likes

I am not dogpiling.

Creating a skeleton key for a physical device is one thing. A person has to get physical access to open it. A skeleton key for digital, internet connected devices is a different problem set. Remotely accessible, automatable attacks aren’t just common, they are the norm.

What is being asked is beyond the pale for any key custodian or cryptographer.

7 Likes

Can’t they already do this? I know ours can. I thought the US did the same kind of soft rubber hose cryptography deal?

See, I don’t like that trick answer, because when was the last time you saw a real number delimited like that?

First off: Nice Avatar.

Second: YES. Of Course it’s yes. No one is questioning that this is possible. The problem is that “relatively strong” is by cryptography standards, “weak.” The problems are numerous but range from custodianship of key information down to the very simple and very true fact that the US government has squandered any good will and trust they would have otherwise deserved by ignoring and bypassing courts, and engaging in extrajudicial data collection.

2 Likes

Probably about a week ago… but, I do end up seeing communication from a rather diverse list of countries on a daily basis. :slight_smile:

I understand not liking the answer, though. To be honest, I mainly know that answer because I fairly recently saw the same question, but instead of a set of numbers in parentheses, it had them listed out in a sentence, with a period at the end.

But when I proposed a scheme in my comments above (see here and here and here), the objections here were not really mathematical, but rather focused on the human factor, namely the possibility that the secret key would get leaked even if it was kept offline and only a few officials could have access to it (see this reply), along with one point about a technical limitation in possible key lengths built into some existing devices and software (which could be dealt with by making some legislation about allowing for longer key lengths in future releases). This suggests that claiming the idea is “mathematically impossible” is not really true at all, and that the main objections are in the fuzzier realm of predicting human behavior.

That would be because you don’t have any details in there about the math - it’s all about physical security. Also, I doubt many of us here are among the wide range of encryption experts who have repeatedly said that what is being asked for is not technically feasible. If you want to argue against them, this isn’t the best forum.

2 Likes

Well, I had said the following (based just on my memory of learning in a college math class about the details of one of the simplest crypto schemes, the RSA system):

And renke responded:

Do you think renke is incorrect about the mathematics? If so, can you link specifically to a claim by a cryptographer that it’s not mathematically possible to produce a sufficiently large key that would take a prohibitive amount of time (say, at least several decades) to crack with present-day supercomputers? (assuming only existing computational methods are available and there have been no leaks or radical breakthroughs in number theory)

It’s still legal to use strong cryptography here, though not to export, apparently. So having something the government can’t get access to or selling technology to accomplish that is not, ipso facto, a crime in the US. But I fear that’s where we’ll get to eventually.