Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

30 Years of Public Key Cryptography

Zonk posted more than 7 years ago | from the happy-cjsuiebz dept.

83

An anonymous reader writes "Public key crypto turned 30 last night, and the biggest names in crypto turned out to celebrate at an event hosted at the Computer History Museum. Voltage Security teamed with RSA to bring together some of the most famous cryptographers of yesterday (Whitfield Diffie and Martin Hellman) and today (Dan Boneh), along with luminaries Ray Ozzie, Brian Snow, and Jim Bidzos. From the ZDNet article: 'NYT reporter John Markoff, who has covered Silicon Valley for 30 years, was master of ceremonies, and started off by saying that no technology has had a more profound impact than cryptography, and that public-key cryptography has been underappreciated for its role in the Internet. Without public key cryptography, ecommerce would be an idea as opposed to an enabler of billions of daily transactions.' You can view the podcast and pictures of the event at the Voltage Security site.."

cancel ×

83 comments

Sorry! There are no comments related to the filter you selected.

Celebration! (4, Funny)

krell (896769) | more than 7 years ago | (#16621138)

Let's celebrate the anniversary! Party at d$3vF434. $D%f$sdsN4. Don't miss it!

Re:Celebration! (1)

Simon Garlick (104721) | more than 7 years ago | (#16626902)

The magic address is Squeamish Ossifrage.

Damn! (1)

elronxenu (117773) | more than 7 years ago | (#16621144)

Can't make sense of it - what's the passphrase?

When cryptography is outlawed, (2, Funny)

Myself (57572) | more than 7 years ago | (#16621176)

bayl bhgynjf jvyy unir cevinpl.

(If you do a run of stickers with that on them, kindly tell me, and I'll buy some from you.)

Re:When cryptography is outlawed, (0)

Anonymous Coward | more than 7 years ago | (#16621338)

I'm confused. Would you prefer the stickers to be printed with the rot13 or the cleartext?

PS: Either way, me too! ;)

Re:When cryptography is outlawed, (1)

laejoh (648921) | more than 7 years ago | (#16621380)

Let's hope noone will sue me because of the dmca.

It's a simple substitution cypher:

a -> n

b -> o

c -> p

e -> r

f -> s

g -> t

h -> u

i -> v

j -> w

l -> y

n -> a

p -> c

r -> e

v -> l

y -> l

Fun to decrypt with frequency analysis, specially because the most frequent 'e' is only used once :)

Re:When cryptography is outlawed, (0)

Anonymous Coward | more than 7 years ago | (#16621394)

You're one of those guys who uses trigonometry to prove that 2+2=4, aren't you?

Re:When cryptography is outlawed, (1)

laejoh (648921) | more than 7 years ago | (#16621412)

Well, if we define true as one, then: cos 2pi

Re:When cryptography is outlawed, (0)

Anonymous Coward | more than 7 years ago | (#16622632)

Have you ever heard of "rot13"?

Re:When cryptography is outlawed, (1)

owlstead (636356) | more than 7 years ago | (#16621428)

Anybody who is *still* wondering what this is, there is a leetkey plugin for firefox that can "decrypt" such messages for you:

https://addons.mozilla.org/firefox/770/ [mozilla.org]

Re:When cryptography is outlawed, (1)

Andrew Kismet (955764) | more than 7 years ago | (#16621730)

You're not using Firefox 2? Shame on you!

Re:When cryptography is outlawed, (3, Funny)

Progoth (98669) | more than 7 years ago | (#16623684)

You're not using Nightly Tester Tools with Firefox 2? Shame on you!

(for the uninformed, NTT allows you to easily install extensions that are only marked for compatibility with older FF versions)

Re:When cryptography is outlawed, (1)

TheUnknownCoder (895032) | more than 7 years ago | (#16622794)

Damn! I just used my last mod point. Otherwise I'd mod you up Informative... I really like this little plugin!!!

Re:When cryptography is outlawed, (1)

chgros (690878) | more than 7 years ago | (#16625474)

You can even do this with a bookmarklet [squarefree.com] .

30th birthday of what exactly? (1, Interesting)

Anonymous Coward | more than 7 years ago | (#16621220)

So, is this the 30th anniversary of the public discovery of public key cryptography or the 30th anniversary of the official (publicised) date on which Clifford Cox and co secretly discovered it for a very non-public organisation?

Re:30th birthday of what exactly? (3, Informative)

Al Dimond (792444) | more than 7 years ago | (#16623644)

Wikipedia says that Diffie and Hellman published their work in 1976, and that the earlier secret work was going on in the early 70s. So it looks like they're talking about the public discovery, assuming both that Wikipedia is correct and that I can add small numbers in my head accurately.

Re:30th birthday of what exactly? (3, Informative)

Anonymous Coward | more than 7 years ago | (#16624022)

Yes, public key cryptography was first discovered by Clifford Cox (of the British GCHQ) in 1973 (in contrast, RSA was invented in 1977 according to wikipedia). But, because Cox' research was kept secret until long after RSA had become mainstream it did nothing to advance cryptographic research. Same applies to the first computer - We now know that Colossus was the first computer [1] and not Eniac, but since Eniac was not kept secret it literally became the grandfather of all computers in spite of Colossus; because, lets face it, Colossus has nothing to do with the linage of computers we have today. Sure, the britts were first but because of their lack of vision and secrecy, they may always be remembered as the "mee too"-guy.

[1] Actuallly, some claim a German beat them to the punch.

I assure you I'm not American. I just feel the Americans deserve a hell of a lot more credit for this stuff because without RSA we might never have gotten public key cryptography. IIRC Clifford Cox's work was only made public because RSA became widely known.

Re:30th birthday of what exactly? (1)

pthisis (27352) | more than 7 years ago | (#16636084)

I just feel the Americans deserve a hell of a lot more credit for this stuff because without RSA we might never have gotten public key cryptography

Diffie/Hellman/Merkle's work was pointing the way; I have to think public-key would've happened in relatively short order (within 5-10 years) without RSA.

first papers on PKC (5, Interesting)

ei4anb (625481) | more than 7 years ago | (#16621228)

It was a fun time.

I was a math undergrad interested in large prime numbers and numerical computing when the first hints on what RS&A were doing came out in Scientific American. At that time I had only 3 years programming experience and it was a big thrill to get a public key crypto email system working (first in Pascal on a DEC-20) but I only distributed it to a small group as the university was not yet on the Internet.

I told the story to PZ at a conference about 8 years ago and we had a good laugh wondering how things might have developed differently had that program been distributed on Usenet by someone outside the USA!

Re:first papers on PKC (2, Interesting)

coderpunk (930756) | more than 7 years ago | (#16623160)

Was PZ at this event? PGP did more than anything to bring public key crypto into the mainstream.

May be older than 30 years old (4, Interesting)

Yahma (1004476) | more than 7 years ago | (#16621250)

Historians of science will certainly spend time sorting out the various claims. David Kahn, the author of the best selling history The Codebreakers, said that he recently asked the National Security Agency to declassify some documents so he could write the proper history of public key cryptography. He said an NSA staff member told him, "I've spoken to the guys who did this, but they don't want to be interviewed now." This suggests that the NSA also may have discovered public-key systems or had a hand in exploring them. Kahn hopes that the NSA will follow in Britain's lead so an accurate history can be written.

It is likely that the NSA discovered public key Cryptography in the late 60's or early 70's. Public Key Cryptography may be as old as 40 years old at this point, but without clarification from the NSA, we will never be certain.


---
Yahma
Proxy Storm [proxystorm.com] - Free Anonymous Proxy Service for security conscious individuals.

Re:May be older than 30 years old (0)

Anonymous Coward | more than 7 years ago | (#16621518)

Indeed. Public key cryptography was first discovered in EhZO032Kk3o4IfJ= by the NSA!

Re:May be older than 30 years old (1)

LandruBek (792512) | more than 7 years ago | (#16621626)

You're both right. Actually the party was supposed to celebrate "Public public key cryptography" but someone's word processor along the way saw the repeated word and took it out... :-)

Actually I'm SURE it is (1)

Cougem (734635) | more than 7 years ago | (#16621686)

When I was at school we saw a film on crytography saying a British mathematician had come up with the idea before it had been published to the public by a fairy long time. It was for government use though, and so very classified.
Can anyone back this up? I definitely remember watching the film, and feeling very sorry for the poor bloke who got basically nothing for his idea.

Re:Actually I'm SURE it is (2, Insightful)

h2g2bob (948006) | more than 7 years ago | (#16622014)

Wikipedia (http://en.wikipedia.org/wiki/RSA) says it was first invented by Clifford Cocks at good ol' GCHQ. I also read that somewhere in a book, so it's probably right.

Worst. post. (-1, Redundant)

Anonymous Coward | more than 7 years ago | (#16621272)

ever.

30 years eh? (1)

onetwofour (977057) | more than 7 years ago | (#16621284)

Time for it's mid life crisis then, well with the UK Government wanting all our keys soon then it's nice and apt.

No technology with a more profound impact? (2, Insightful)

Anonymous Coward | more than 7 years ago | (#16621290)

no technology has had a more profound impact than cryptography

I hear that the wheel had quite an impact. Oh yeah and the steam engine. Not fogetting the printing press. Or even plastic. Seriously, do they even think before parroting this nonsense?

Re:No technology with a more profound impact? (1)

lheal (86013) | more than 7 years ago | (#16621396)

The transistor, Unix, and PERL, probably each had as big an impact as PKC.

Insipid journalists.

Re:No technology with a more profound impact? (2, Insightful)

jcmb (936098) | more than 7 years ago | (#16623054)

If PKC isn't as important as you say it is, then why do we have a multibillion dollar agency (which hires the most brilliant mathematicians and computer scientists in the country) almost entirely devoted to cryptography? Plus, it's illegal for us to use certain key sizes because the NSA considers it to be a weapon!

PKC and other forms of cryptography are extremely important and vital to the success of NATIONS. Plus, imagine how hard it would be to communicate over the Internet without PKC, you'd have to syncronize keys with the second party all the time!

Re:No technology with a more profound impact? (1)

lheal (86013) | more than 7 years ago | (#16624632)

I know cryptography is important. But it's like saying the lock is more important than the house, or keyed ignition more important than internal combustion.

Re:No technology with a more profound impact? (1)

Gandalf_the_Beardy (894476) | more than 7 years ago | (#16624940)

They'd be screwed without electricity though. Mind you governments managed without that as well.

GCHQ in 1973! (4, Informative)

spoonist (32012) | more than 7 years ago | (#16621296)

stop spoiling the Americans party (0, Funny)

Anonymous Coward | more than 7 years ago | (#16622104)


oh come on everyone knows the Americans cracked the Enigma code and single handedly beat the Germans in WW2, invented the steam engine, electricity, telephones, TV and are the World champions of baseball and football !

GO USA #1 *

*not applicable in 191 countries

Re:GCHQ in 1973! (1)

leob (154345) | more than 7 years ago | (#16622408)

Right, and Native Americans invented the wheel.

At GCHQ, they did not understand the importance of it.

Re:GCHQ in 1973! (1)

stevey (64018) | more than 7 years ago | (#16622692)

At GCHQ, they did not understand the importance of it.

I think if they hadn't understood the importance of it they wouldn't have kept it classified.

Re:GCHQ in 1973! (1)

leob (154345) | more than 7 years ago | (#16624104)

All their notes are classified by default. They did not bother to declassify it.

Re:GCHQ in 1973! (1)

Sanity (1431) | more than 7 years ago | (#16623010)

At GCHQ, they did not understand the importance of it.
Even if that were true, and I see no evidence to suggest that it is, it still wouldn't change the fact that they invented it first.

Re:GCHQ in 1973! (2, Interesting)

leob (154345) | more than 7 years ago | (#16623970)

I've attended the meeting, I've seen that evidence. The GCHQ articles on PKC had quite dismissive titles.

Re:GCHQ in 1973! (0)

Anonymous Coward | more than 7 years ago | (#16623212)

"Did you know...
"GCHQ employs more mathematicians than the average university maths faculty?


And fewer English majors than the average Englishes faculty.

Re:GCHQ in 1973! (1)

shma (863063) | more than 7 years ago | (#16623708)

I would suspect that they are celebrating the 30 year anniversary of PKC being available to the general public. Still, it is only fair to credit the original inventors.

Re:GCHQ in 1973! (1)

bendodge (998616) | more than 7 years ago | (#16623780)

Martin Hellman and Whitfield Diffie unveiled DES encryption in June 1976, after years of work and being told by IBM that it was impossible. DES had a disadvantage; it required both parties to be active at the same time.

Ronald Rivest, Adi Shamir and Leonard Adleman invented RSA encryption in 1977. It was better than DES, because it did not require the both parties to be online at the same time. It did require a public key directory, though.

It was not until years later that the British Government announced that the GCHQ had invented RSA cryptography in 1973. James Ellis, a very eccentric cryptographer and Clifford Cocks, a young mathematician were responsible for the discovery. Malcom Williamson, another GCHQ mathematician, verified the valitidty of their methods. Both were graduates of Manchester Grammar School and contestants in the 1968 Mathematical Olympiad.

Then in June 1991 Phil Zimmermann released PGP to the public, which earned him a grand jury investigation for being an arms dealer, as cryptography is classified with missiles an bombs.

Now, governments around the globe are trying to ban strong encryption, as it ruins digital wiretapping. If strong encryption is restricted by the government, such as part 3 of the UK's RIP Act, the future of computer commerce is at stake.

Missed opportunity (0, Flamebait)

agent dero (680753) | more than 7 years ago | (#16621372)

the biggest names in crypto turned out to celebrate at an event hosted at the Computer History Museum.

I'm disappointed that our government missed this key opportunity to ensure their surveillance will go forward willout having to deal with that silly "encryption" and such ;)

Then again, maybe on that note, we can organize a "Islamic Fundamentalist Luncheon" and let some mob-folk "take care of things."

Re:Missed opportunity (1)

starfishsystems (834319) | more than 7 years ago | (#16622684)

The cat's already out of the bag, lad.

The real "missed opportunitity", if you think of it as such, was from the middle of the last century in Bletchley Park and elsewhere. That's when cryptography and computer science started to come together.

OB Star Trek Reference (1)

notnAP (846325) | more than 7 years ago | (#16621392)

So, then, by the book, crypto has only been around for, what, 30 hours?

Great to see Ray Ozzie in that list. (3, Interesting)

CFD339 (795926) | more than 7 years ago | (#16621422)

A lot of people seem to forget that one of the first really widespread products that end users in corporations used that fully integrated public/private key encryption was Lotus Notes. I started using it in 1991, but I believe as early as 1989 it was functionally part of the product.

Sure, others used it before then, but in terms of a widely used corporate end user audience, it was (and still is to some extent) unique.

Yes, you may now rag on Notes if you like -- of course, keep in mind it remains the only real solution for a major corporation that by public key authentication and encryption by default, has a fully functional smtp mta built in, handles the front end needs of end users well enough for salespeople (not like a typical pop or imap client) and of course, fully supports linux as a server platform (and within a few months as a client platform as well). :-)

Re:Great to see Ray Ozzie in that list. (1)

MichaelSmith (789609) | more than 7 years ago | (#16626366)

Yes, you may now rag on Notes if you like -- of course, keep in mind it remains the only real solution for a major corporation that by public key authentication and encryption by default

Like many other good ideas I believe it was given a bad reputation by the lusers who invested their careers in notes as a platform for everything.

Once standardisation sets in notes becomes a reason not to do stuff, or at least not to bother trying.

No Zimmerman? Where was the real party? (3, Insightful)

xxxJonBoyxxx (565205) | more than 7 years ago | (#16621438)

No Zimmerman? Where was the real party?

Re:No Zimmerman? Where was the real party? (1)

danielsz (985326) | more than 7 years ago | (#16621766)

PGP nostalgia?

Re:No Zimmerman? Where was the real party? (1)

dodobh (65811) | more than 7 years ago | (#16628664)

He was there in an encrypted form.

eCommerce possible without public key crypto (3, Interesting)

Roger_Wilco (138600) | more than 7 years ago | (#16621772)

I don't like to take away from their excellent work, but it is possible, though inconvenient, to do private-key crypto for such things.

Your bank, for example, would need to [paper] mail you a private key to type into your machine (or give you a thumbdrive with it, whatever you like). Inconvenient, yes; you'd need a new key for each company you interact with. Probably it would encourage a few monopolies (amazon and eBay) to dominate, since you'd only need to interact with them by paper once. But not impossible.

Re:eCommerce possible without public key crypto (1)

wkk2 (808881) | more than 7 years ago | (#16621850)

For most transactions, you only really need a private key shared with your credit card provider.
Merchants could do the same and the problem is mostly solved without a PKI. We still might need to do this anyway.
One time tokens anyone?

Re:eCommerce possible without public key crypto (1)

TheUser0x58 (733947) | more than 7 years ago | (#16624222)

would need to [paper] mail you a private key

This would not work at all, because someone could easily intercept your mail at the mailbox, post office, etc. Sending plaintext by snail mail is just as secure as sending plaintext over the net, i.e. its not.

For this to be secure you would probably have to go and pick up your private key at the bank yourself.

Re:eCommerce possible without public key crypto (1)

daverabbitz (468967) | more than 7 years ago | (#16626290)

Well how do you get your password for online banking.

It's (snail)mailed out to you, then you login and change it.

I don't see the difference between this and mailing you a key.

And yes i know them mailing personal authentication data to you is horrendously insecure, but that's not the point.

The real advantage to PKI is that you can set up the encryption prior to the exchange of authentication data, which makes application design much easier.

Re:eCommerce possible without public key crypto (1)

TapeCutter (624760) | more than 7 years ago | (#16631034)

That's not exactly how it works, there are two keys one private (bank) and one public (customer). The public key does not need to be a secret since it can't be used to decrypt the message only encrypt it. The "one way" math function is based on the difficulty of factorising large numbers (thus all the interest in large primes). Having a one way function is why PKE is different to other forms of encryption, it means you don't have the problem of distributing a single secret key.

Eg: SSL uses public key encryption and you don't need a "new key on a bit of paper" for each store. Note that SSL only makes the communication secure, you still need the credit card details to buy stuff.

No OpenSSH developers? (0)

Anonymous Coward | more than 7 years ago | (#16621868)

Why didn't they invite theo de raadt, responsible for getting ssh into the mainstream?

Wrong Date (2, Informative)

gilgongo (57446) | more than 7 years ago | (#16621960)

Public key encryption was invented in 1973 at GCHQ in Britain.

I suppose the commercial victors get to (re)-write the history books then.

Re:Wrong Date (1)

Lord Ender (156273) | more than 7 years ago | (#16624566)

Yes. Publish or perish.

How many use it? (3, Interesting)

steevc (54110) | more than 7 years ago | (#16622056)

I've had a public key for a few years and have cross-signed keys of a few people I know, but most do not encrypt or even sign their emails despite knowing the insecurities of email. I'm surprised that it is not used more commercially, but I have never had a signed or encrypted email at work and that often involves commercially sensitive information.

Could it be that encryption is still to complex for most people?

I will continue to encrypt emails to those I know can handle it and will sign others.

implementations? (1)

xmodem_and_rommon (884879) | more than 7 years ago | (#16622156)

Can you please point me to either a free email client that is easy enough to use and has a decent interface? Or a plugin for an existting one, that supports this? I'd be very interested in doing this (although I don't know anyone who has the technical capacity to figure out how to read it that wouldn't just ask me to send it unencrypted)

Re:implementations? (1)

lifebouy (115193) | more than 7 years ago | (#16622234)

Re:implementations? (1)

xmodem_and_rommon (884879) | more than 7 years ago | (#16622438)

That list looks a bit outdated. Netscape mail, but no thunderbird? At this stage i'm using Mac OS X Mail as my mail client, but the GPGMail site says: "GPGMail is a complete hack, relying on Mail's private internal API. Use it at your own risks!" From the number of times ive almost lost large portions of my email because of Mail's less-than-ideal database sytem, i'd rather not risk it. Plus the screenshots are obviously from like OSX.1 o2 X.2. Although the last updated date is fairly recent. I might ry it out on another user. -Richard

Re:implementations? (3, Informative)

starfishsystems (834319) | more than 7 years ago | (#16622722)

If you're talking about S/MIME, it's standard in most mailers. How about Thunderbird, Evolution, or even Microsoft Outlook?

Re:How many use it? (1)

cryfreedomlove (929828) | more than 7 years ago | (#16622162)

You are right that it is not in common use for emails. However, the fact that it is there and available for private individuals is comforting to me.

Re:How many use it? (1)

SLi (132609) | more than 7 years ago | (#16623814)

It's not very common with e-mail (and that makes me sad), but it's very common in WWW. Every time you access a https-URL you use public key cryptography.

Re:How many use it? (1)

TheRaven64 (641858) | more than 7 years ago | (#16623926)

Do you do any online banking? Have you ever bought anything from a web site? If you have, then you have used HTTP tunnelled over SSL. SSL is an example of public key cryptography.

Barriers to use of email encryption (3, Informative)

Sloppy (14984) | more than 7 years ago | (#16624228)

Complexity may be an issue, but I think it's a relatively minor one.

The biggest issue is that people simply really just don't care. When I try to advocate this stuff to laymen, by far the most common comment I hear is "So what if someone reads my email?" Most people don't think email privacy is worth protecting. Yes, even despite the news stories in the last few years (i.e. the government really is reading your email; it's not just a paranoid crackpot theory anymore).

Another issue is something that has actually gotten worse in the last 10 years. Webmail is very popular. It's nearly impossible to do email encryption correcting using webmail instead of "real" (e.g. POP or IMAP) mail. You either have to trust a foreign system with your keys, or you have to have so much non-web-intelligence running inside the web browser (e.g. a Java applet or something) that it isn't really webmail anymore. And even if you make it sophisticated enough to run on the web browser, you lose one of the major advantages of webmail: checking your email from anywhere, including untrusted machines. (The only way to do it then, is for the user to do the crypto inside their head instead of using a computer.) It's a mess and it just can't be done right. As long as people want webmail, as long as they see it as a good thing instead of a bad thing, they can't have good encryption. (Well, unless they are the admin of the web server. e.g. One person at Google could conceivably use gmail as a secure webmail system. ;-)

In another 30 years... (1)

jonwil (467024) | more than 7 years ago | (#16622410)

Hopefully in 30 years from now, we will live in a world where encrypting email, IM conversations, personal documents and anything else that you would rather not be public becomes something everyday people do and not something that "geeks" do.
Hopefully we see a world where the major email clients (including Thunderbird/Seamonkey) come with easy to use email encryption out of the box.
Hopefully we see a world where your communications and data are safe from people you would rather didnt see them (black-hat hackers, identity thieves, your worst enemy, your boss, the RIAA etc etc)

Re:In another 30 years... (1)

WuphonsReach (684551) | more than 7 years ago | (#16622900)

I suspect that what might work without overhauling SMTP completely (and this is very much a blue sky idea).

1a) Mail servers that start caching SSH-style public keys for servers that they talk to. Then encrypt the transport between the two servers. There are definitely MITM attacks that could be mounted, but the outbound MTA might simply keep track of key-changed events in the log files. Let the admins worry about it, if they do.

1b) IPSec with opportunistic encryption for encrypting the transport. Maybe you get DNS (or secure DNS) involved for proving the validity of the public keys. Or maybe you take a page out of the SSH playbook and simply tell the user that the mail may not have been delivered to the system that we think it should've been delivered.

2) Mail clients that create a public key and hand it the POP3/IMAP server. Then the server could simply encrypt the message files as they get written to the disk using the user's public key. This runs into all sorts of issues (no web-access to your mail folder, difficulting in retrieving e-mail with another e-mail client, lost e-mail if you lose your private key). So I don't know how well that would work out in principle (probably not well).

Personally, I think securing the SMTP link is probably the most realistic. Paranoid MTA admins could decide that all keys have to be pre-validated before e-mail can be delivered to the remote system. The rest of us could simply accept the small risk of MITM and watch our log files for keys that change. Or check our destination keys against public lists of server keys (sort of a reputation service).

Re:In another 30 years... (2, Informative)

jonwil (467024) | more than 7 years ago | (#16623388)

You dont need to make it that complex.
Essentially, if the recipiant supports encryption, the recipiants public key is pulled from a key server. Then, the email client encrypts it using something similar to PGP or GPG. Something thats standard enough that anyone can implement it.
At the other end, it is decrypted by the mail client using the recipiants private key.
All that the servers in the middle see is an encrypted email (same as they would see if you encrypted an email right now with PGP or GPG or whatever). The servers dont need to know about the encryption or be changed in any way.

No issues with being able to access the email from anywhere, as long as you have your private key, any email client with the right encryption support would be able to decrypt the email (including web based email clients if you were willing to trust uploading your private key to a https:/// [https] server run by whoever provides your email)

And with this, mail servers (and mail server admins) never see the unencrypted email.

Assuming the key management is good enough (i.e. that you can trust that who the system says owns the key actually owns it), it can also be used to verify that the sender is who they say thay are.

The downside is the need to en- and de-crypt on the client side which might be an issue for some embedded applications (although these days most mobile phones, PDAs and the like that have internet/email generally have web browsers that understand SSL and if they have the CPU to handle SSL, they can probobly handle encrypted email)

30 Years of *Public* Public Key Cryptography (1)

szyzyg (7313) | more than 7 years ago | (#16623162)

We all know public key cryptography was a secret for many years before it became public. Officially GCHQ got there first.

John Markoff (2, Interesting)

Progoth (98669) | more than 7 years ago | (#16623694)

Is this the same John Markoff that got Kevin Mitnick thrown in jail for lying about him in the New York Times?

The evils of public-key cryptography (3, Informative)

Myria (562655) | more than 7 years ago | (#16623834)

For all the legitimate uses of public-key cryptography, I seem to think that most uses of it are bad. I see the Xbox, Xbox 360, Vista, Leopard and Tivo using public-key cryptography for nothing but removing the authority of computer owners to decide what software they run on their computer. I see VeriSign getting rich off the VeriSign Tax.

I personally think that it would be far better to make use of shared-secret systems for when you need communication security, like logging onto banks. The solution to phishing is clearly to use a shared secret system, because things like IE7's anti-phishing filtering can be worked around. SRP6 is great, but unfortunately that is based on public-key technology (though doesn't actually involve a public key, like Diffie-Hellman).

I hope that someday it is proven that public-key cryptography cannot be securely attached to an NP-complete problem, and that either a fast discrete logarithm algorithm (*) is found or quantum computers take off.

(*) A fast solution to the discrete logarithm problem implies a fast solution to integer factorization.

Melissa

Re:The evils of public-key cryptography (1)

Lord Ender (156273) | more than 7 years ago | (#16624628)

My mind boggles at your comment.

"most uses of it are bad."
You must have a different definiton of "most" from the rest of us.

DRM can be implemented using either symmetric or public key crypto.

Re:The evils of public-key cryptography (1)

xenocide2 (231786) | more than 7 years ago | (#16626860)

How about SSL? Does the fact that millions of credit card transactions occurring over the internet are protect by public-key tech not register for you?

YuO fail it!S? (-1, Flamebait)

Anonymous Coward | more than 7 years ago | (#16623872)

continues toChew the deAl wFith you and arms and dick

Overstatement (2, Interesting)

iamacat (583406) | more than 7 years ago | (#16623958)

Without public key cryptography, ecommerce would be an idea as opposed to an enabler of billions of daily transactions.

Hardly. Phone conversations are not encrypted and can be/are intercepted, yet phone commerce is commonplace. Even in-person credit card purchases are hardly secure and there are a number of websites that do e-commerce without encryption. Without public key cryptography, more attention would be paid to security of the path between your ISP and the vendor. Websites could also have you set up username and password over a more secure channel and then use plain symmetrical encryption for the actual purchase.

No Schneier, Zimmermann, etc? (0)

Anonymous Coward | more than 7 years ago | (#16623996)

As important as Zimmermann is, Schneier's a must have. Also no Rivest, Shamir or Adleman? It sounds like a party for management by management.


Sigh ...

Thanks for (holding back) encryption, RSA! (2, Insightful)

iansmith (444117) | more than 7 years ago | (#16624270)

Without public key cryptography, ecommerce would be an idea as opposed to an enabler of billions of daily transactions.

And without the patent on public-key encryption that covered not just the method but the very idea of it, we might all have secured communications by now. But instead we are not much further ahead except for ssh which at least helps network admins.

I just have a hard time cheering for RSA which did nothing other than patent a mathematical formula discovered by multiple people and prevent it's dfree use in America and other countries that allow software patents.

I was using PGP back in the early 90's and was frustrated that it's use was hamstrung by the patent and US laws on exporting encryption software. What a waste.

Re:Thanks for (holding back) encryption, RSA! (1)

mochan_s (536939) | more than 7 years ago | (#16630610)

Maybe I'm wrong but there are other ways of doing asymmetrical encryption schemes (elliptic functions in Galois fields) that are not patent encumbered.

Maybe there was no will to develop it?

Re:Thanks for (holding back) encryption, RSA! (1)

iansmith (444117) | more than 7 years ago | (#16683455)

The patent covered those methods too. In fact, it covered ANY implementation of public key encrypyion no matter what kind of math was involved, even if teh math had not yet been invented.

Don't you just love software patents?

30 years - are you sure ? (0)

Anonymous Coward | more than 7 years ago | (#16626262)

Public Key Cryptography was developed by the the British back in the 60's. The only reason that you Americans did not notice was that either they can keep a secret.

The Dark Side of Cryptography (0)

Anonymous Coward | more than 7 years ago | (#16628418)

It's probably a good time to reflect on the public key cryptography patents.

These shut down public key cryptography work for a long time. It wasn't until those wretched patents expired that internet commerce finally took off. And what have we seen with every other patent since then? People avoid them until it expires. The best patent owners can do is 'submarine' them, a la Unisys.

Rivest, Shamir or Adleman should go down in history as a group of assholes who were at the leading end of the malicious patent trade. When those guys die, I'll be sure to visit their graves and piss on them. Well, Rivest at the very least.
Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>