Jump to content
Science Forums

Math plus cryptography equals drama and conflict


C1ay

Recommended Posts

Cryptography is just about as old as written communication itself, and mathematics has long supplied methods for the cryptographic toolbox. Starting in the 1970s, increasingly sophisticated mathematics began to make inroads into cryptography, changing the nature of the field and bringing new perspectives on what it means to keep communications secure.

 

Neal Koblitz is a mathematician who, starting in the 1980s, became fascinated by mathematical questions in cryptography. In his article "The Uneasy Relationship Between Mathematics and Cryptography", to appear in the September 2007 issue of the Notices of the AMS, Koblitz recalls some of the drama and conflict that he witnessed while doing research in mathematical cryptography in the past two decades. His article discusses how mathematics has been used in cryptography research and also comments on the cultural aspects of the mixing of the two fields.

 

Just before Koblitz got interested in cryptography, the National Security Agency had carried out a heavy-handed but ultimately unsuccessful attempt to restrict open research in the field. As a result, research in cryptography carried a whiff of "forbidden fruit", and the launching of a series of cryptography conferences in the 1980s became an act of defiance. As Koblitz describes, the conferences were dominated by colorful, iconoclastic figures, and the corporate influence was much less than it is today.

 

It was around that time that Koblitz and others originated a new approach to cryptography called "elliptic curve cryptography", or ECC. The approach uses elliptic curves, which are planar curves that have special properties and are central to modern number theory (elliptic curves played a key role, for example, in Andrew Wiles's proof of Fermat's Last Theorem). Commercial systems using ECC were developed and marketed by a company now called Certicom Corporation. Koblitz describes the development of ECC and the ways that elliptic and other curves have been used in cryptography. He also talks about an algorithm called "xedni calculus" ("xedni" is "index" spelled backwards) that seemed initially to provide a way to crack ECC systems, but ultimately proved to be an ingenious but impractically slow method of attack.

 

The mixture of mathematics and cryptography is a heady one, as it brings abstract research at the frontiers of mathematics to bear on difficult and fascinating questions where the answers can have a big impact on the outside world. Koblitz describes two pernicious effects of this mixing of the two fields. One he calls the "bandwagon effect", in which mathematicians have distorted their research grant proposals in an effort to appeal to funding entities like the National Security Agency.

 

The other is the effort by various cryptographers to add an aura of reliability to their cryptographic systems by claiming the systems are "provably" secure---that is, by claiming there exists an ironclad mathematical proof of the system's security. Koblitz and a colleague have written several papers critiquing claims of "provable security", and he describes the heated and sometimes bizarre reactions that greeted their critique.

 

Koblitz's article "The Uneasy Relationship Between Mathematics and Cryptography" will be posted today on the Notices web site, Notices of the American Mathematical Society.

 

Source: American Mathematical Society

Link to comment
Share on other sites

  • 3 months later...

More drama and conflict raises its cody head at NSA. :graduate: What back door!? :naughty:

 

 

 

Did NSA Put a Secret Backdoor in New Encryption Standard?

 

Did NSA Put a Secret Backdoor in New Encryption Standard?

Of course, we have no way of knowing whether the NSA knows the secret numbers that break Dual_EC-DRBG. We have no way of knowing whether an NSA employee working on his own came up with the constants -- and has the secret numbers. We don't know if someone from NIST, or someone in the ANSI working group, has them. Maybe nobody does.

 

We don't know where the constants came from in the first place. We only know that whoever came up with them could have the key to this backdoor. And we know there's no way for NIST -- or anyone else -- to prove otherwise.

 

This is scary stuff indeed.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...